Cisco 210-250 - CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals Exam
Page: 1  / 228
							Total 1138 questions
						
								Question #1 (Topic: Topic 1)
								
							
							
																Which definition of a fork in Linux is true?
								
																										
							
						
 A. daemon to execute scheduled commands 
 B. parent directory name of a file path name 
 C. macros for manipulating CPU sets 
 D. new process created by a parent process 
								
								
									Answer: D
								
								
								Question #2 (Topic: Topic 1)
								
							
							
																Which identifier is used to describe the application or process that submitted a log message?
								
																										
							
						
 A. action 
 B. selector 
 C. priority 
 D. facility 
								
								
									Answer: D
								
								
								Question #3 (Topic: Topic 1)
								
							
							
																Which protocol is expected to have a user agent, host, and referrer header in a packet capture?
								
																										
							
						
 A. NTP 
 B. HTTP 
 C. DNS 
 D. SSH 
								
								
									Answer: B
								
								
								Question #4 (Topic: Topic 1)
								
							
							
																Which evasion method involves performing actions slower than normal to prevent detection?
								
																										
							
						
 A. traffic fragmentation 
 B. tunneling 
 C. timing attack 
 D. resource exhaustion 
								
								
									Answer: C
								
								
								Question #5 (Topic: Topic 1)
								
							
							
																Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
								
																	
							
						
 A. replay 
 B. man-in-the-middle 
 C. dictionary 
 D. known-plaintext 
								
								
									Answer: B