Implementing Cisco Cybersecurity Operations v9.2 (210-255)

Page:    1 / 6   
Total 80 questions

Which of the following are core responsibilities of a national CSIRT and CERT?

  • A. Provide solutions for bug bounties
  • B. Protect their citizens by providing security vulnerability information, security awareness training, best practices, and other information
  • C. Provide vulnerability brokering to vendors within a country
  • D. Create regulations around cybersecurity within the country


Answer : B

Which CVSSv3 Attack Vector metric value requires the attacker to physically touch or manipulate the vulnerable component?

  • A. local
  • B. physical
  • C. network
  • D. adjacent


Answer : A

Which two components are included in a 5-tuple? (Choose two.)

  • A. port number
  • B. destination IP address
  • C. data packet
  • D. user name
  • E. host logs


Answer : B,C

Explanation: The source and destination addresses are primary 5-tuple components. The source address is the IP address of the network that creates and sends a data packet, and the destination address is the recipient.

Which network device creates and sends the initial packet of a session?

  • A. source
  • B. origination
  • C. destination
  • D. network


Answer : A


Refer to the exhibit. You notice that the email volume history has been abnormally high.
Which potential result is true?

  • A. Email sent from your domain might be filtered by the recipient.
  • B. Messages sent to your domain may be queued up until traffic dies down.
  • C. Several hosts in your network may be compromised.
  • D. Packets may be dropped due to network congestion.


Answer : C

Which goal of data normalization is true?

  • A. Reduce data redundancy.
  • B. Increase data redundancy.
  • C. Reduce data availability.
  • D. Increase data availability


Answer : A

A user on your network receives an email in their mailbox that contains a malicious attachment. There is no indication that the file was run. Which category as defined in the
Diamond Model of Intrusion does this activity fall under?

  • A. reconnaissance
  • B. weaponization
  • C. delivery
  • D. installation


Answer : C

Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?

  • A. confidentiality
  • B. integrity
  • C. availability
  • D. complexity


Answer : C

Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?

  • A. confidentiality
  • B. integrity
  • C. availability
  • D. complexity


Answer : B

Which of the following is one of the main goals of data normalization?

  • A. To save duplicate logs for redundancy
  • B. To purge redundant data while maintaining data integrity
  • C. To correlate IPS and IDS logs with DNS
  • D. To correlate IPS/IDS logs with firewall logs


Answer : B

Which Security Operations Center's goal is to provide incident handling to a country?

  • A. Coordination Center
  • B. Internal CSIRT
  • C. National CSIRT
  • D. Analysis Center


Answer : C

You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts?
(Choose two.)

  • A. file size
  • B. domain names
  • C. dropped files
  • D. signatures
  • E. host IP addresses


Answer : A,E

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

  • A. collection
  • B. examination
  • C. reporting
  • D. investigation


Answer : A

Which option creates a display filter on Wireshark on a host IP address or name?

  • A. ip.address == <address> or ip.network == <network>
  • B. [tcp|udp] ip.[src|dst] port <port>
  • C. ip.addr == <addr> or ip.name == <name>
  • D. ip.addr == <addr> or ip.host == <host>


Answer : D

Which data element must be protected with regards to PCI?

  • A. past health condition
  • B. geographic location
  • C. full name
  • D. recent payment amount


Answer : D

Page:    1 / 6   
Total 80 questions