Cisco 210-250 - CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals Exam
Page: 1 / 228
Total 1138 questions
Question #1 (Topic: Topic 1)
Which definition of a fork in Linux is true?
A. daemon to execute scheduled commands
B. parent directory name of a file path name
C. macros for manipulating CPU sets
D. new process created by a parent process
Answer: D
Question #2 (Topic: Topic 1)
Which identifier is used to describe the application or process that submitted a log message?
A. action
B. selector
C. priority
D. facility
Answer: D
Question #3 (Topic: Topic 1)
Which protocol is expected to have a user agent, host, and referrer header in a packet capture?
A. NTP
B. HTTP
C. DNS
D. SSH
Answer: B
Question #4 (Topic: Topic 1)
Which evasion method involves performing actions slower than normal to prevent detection?
A. traffic fragmentation
B. tunneling
C. timing attack
D. resource exhaustion
Answer: C
Question #5 (Topic: Topic 1)
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
A. replay
B. man-in-the-middle
C. dictionary
D. known-plaintext
Answer: B