Cisco 210-250 - CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals Exam

Page:    1 / 228   
Total 1138 questions

Which definition of a fork in Linux is true?

  • A. daemon to execute scheduled commands
  • B. parent directory name of a file path name
  • C. macros for manipulating CPU sets
  • D. new process created by a parent process


Answer : D

Which identifier is used to describe the application or process that submitted a log message?

  • A. action
  • B. selector
  • C. priority
  • D. facility


Answer : D

Reference:
https://www.tutorialspoint.com/unix/unix-system-logging.htm

Which protocol is expected to have a user agent, host, and referrer header in a packet capture?

  • A. NTP
  • B. HTTP
  • C. DNS
  • D. SSH


Answer : B

Which evasion method involves performing actions slower than normal to prevent detection?

  • A. traffic fragmentation
  • B. tunneling
  • C. timing attack
  • D. resource exhaustion


Answer : C

Reference:
https://books.google.by/books?id=KIwLSddtAWsC&pg=PA58&lpg=PA58&dq=timing+attack+performing+actions+slower+than+normal+to+prevent
+detection&source=bl&ots=9qu7ywV-mX&sig=_9lwcDDq-WNaYlEeP7VkR0MPAOE&hl=en&sa=X&redir_esc=y#v=onepage&q=timing%20attack%20performing%
20actions%20slower%20than%20normal%20to%20prevent%20detection&f=false

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?

  • A. replay
  • B. man-in-the-middle
  • C. dictionary
  • D. known-plaintext


Answer : B

Page:    1 / 228   
Total 1138 questions