Cisco 210-250 - CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals Exam

Question #6 (Topic: Topic 1)
Which definition of permissions in Linux is true?
A. rules that allow network traffic to go in and out B. table maintenance program C. written affidavit that you have to sign before using the system D. attributes of ownership and control of an object
Answer: D
Question #7 (Topic: Topic 1)
Which definition describes the main purpose of a Security Information and Event Management solution?
A. a database that collects and categorizes indicators of compromise to evaluate and search for potential security threats B. a monitoring interface that manages firewall access control lists for duplicate firewall filtering C. a relay server or device that collects then forwards event logs to another log collection device D. a security product that collects, normalizes, and correlates event log data to provide holistic views of the security posture of an environment
Answer: D
Question #8 (Topic: Topic 1)
If a web server accepts input from the user and passes it to a bash shell, to which attack method if it vulnerable?
A. input validation B. hash collision C. command injection D. integer overflow
Answer: C
Question #9 (Topic: Topic 1)
Which security monitoring data type is associated with application server logs?
A. alert data B. statistical data C. session data D. transaction data
Answer: D
Question #10 (Topic: Topic 1)
Which two terms are types of cross site scripting attacks? (Choose two.)
A. directed B. encoded C. stored D. reflected E. cascaded
Answer: CD
Download Exam
Page: 2 / 228
Total 1138 questions