Sie sind auf Seite 1von 14

9/27/2019 CCNA Cyber Ops (Version 1.

1) - Chapter 1 Exam Answers Full

Commands Help Resources » Download Cisco Packet Tracer » Calculator »

Donations

Search the site 

 CCNA v6 » 200-125 Exam IT Essentials 7.0 » CCNA Security v2.0 »

CCNA Cyber Ops » CCNP » Linux »

CCNA v6 » 200-125 Exam IT Essentials 7.0 » CCNA Security v2.0 »

CCNA Cyber Ops » CCNP » Linux » IOS Commands Help Resources »

Download Cisco Packet Tracer » Calculator » Donation Contact

CCNA Cyber Ops (Version 1.1) –


Chapter 1 Exam Answers Full
 May 13, 2019 |  Last updated on: Aug 26, 2019 |
 CCNA CyberOps |  1 Comment

6 CCNA v6.0 Courseware

https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 1/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

CCNA 1: Introduction to
Jeddah to London Networking

CCNA 2: Routing & Switching


Essentials

CCNA 3: Scaling Networks


₹17,698 BOOK NOW
CCNA 4: Connecting Networks

CCNA v5 + v6.0 Exam


Answers

CCNA 1 CCNA 2 CCNA 3

Share 42 Like 42 4.9 07


CCNA 4

How to find: Press “Ctrl + F” in the browser and fill in CCNA 1 EXAM ANSWERS

whatever wording is in the question to find that FULL

question/answer.
CCNA 1 – Pretest
CCNA 1 – Chapter 1
NOTE: If you have the new question on this test, CCNA 1 – Chapter 2
please comment Question and Multiple-Choice list in CCNA 1 – Chapter 3
form below this article. We will update answers for CCNA 1 – Chapter 4
you in the shortest time. Thank you! We truly value CCNA 1 – Chapter 5
your contribution to the website. CCNA 1 – Chapter 6
CCNA 1 – Chapter 6 Skills PT
1. A computer is presenting a user with a screen CCNA 1 – Chapter 7
requesting payment before the user data is allowed to be CCNA 1 – Chapter 8
accessed by the same user. What type of malware is this? CCNA 1 – Chapter 9
CCNA 1 – Chapter 10
A type of virus
CCNA 1 – Chapter 11
A type of logic bomb
CCNA 1 PT Practice Skills
A type of ransomware *
CCNA 1 – Practice Final
A type of worm
CCNA 1 – Final Exam

C. Ransomware commonly encrypts data on a computer


and makes the data unavailable until the computer user Donation by
pays a specific sum of money Amount:

62. What is cyberwarfare?


Comments:
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 2/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

It is an attack only on military targets.


It is an attack on a major corporation.
It is an attack that only involves robots and bots.
It is an attack designed to disrupt, corrupt, or exploit Donate!
national interests. *

 COMMENTS RECENT  POPULAR


D. Cyberwarfare is a subset of information warfare (IW).
Its objective is to disrupt (availability), corrupt (integrity), CCNA Questions
or exploit (confidentiality or privacy). It can be directed Answers - CCNA
1 (v5.1 + v6.0)
against military forces, critical infrastructures, or other
Chapter 5 Exam
national interests, such as economic targets. It involves Answers 2019 – 100% Full
several teams that work together. A botnet might be one true
of several tools used for launching the attack.
CCNA Questions
Answers - CCNA
3. How can a security information and event management 3 Final Exam
system in an SOC be used to help personnel fight against Answers 2019
security threats? (v5.0.3+v6.0) – Scaling
Networks
By collecting and filtering data * Yes, this is the latest and most
By filtering network traffic complete version, it will help you
By authenticating users to network resources pass the exam
By encrypting communications to remote sites
alio - CCNA 3
Final Exam
Answers 2019
A. A security information and event management system (v5.0.3+v6.0) –
(SIEM) combines data from multiple sources to help SOC Scaling Networks
personnel collect and filter data, detect and classify Dear, please confirm if the latest
threats, analyze and investigate threats, and manage version is enough to pass the
exam, and it is valid. t...
resources to implement preventive measures.
RAPRAP -
4. Which three technologies should be included in an Chapter 4 – Basic
Configuration of a
SOC security information and event management
Cisco Router or
system? (Choose three.) Switch
Proxy service NICE
User authentication
jamal - CCNA 1
Threat intelligence * (v5.1 + v6.0)
Security monitoring * Chapter 5 Exam
Intrusion prevention Answers 2019 –
Event collection, correlation, and analysis * 100% Full
True or False? When a device is

6 sending data to another device


on a remote network, the Et...

https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 3/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

Next »
C, D, F. Technologies in a SOC should include the
following:
Event collection, correlation, and analysis
[Cert] CCNA 200-125
Security monitoring
Security control
Exam
Log managementVulnerability assessment ALL Questions and Answers
Vulnerability tracking
Threat intelligence Lab Simulation
Proxy server, user authentication, and intrusion Lab – CCNA Access List Sim 2
prevention systems (IPS) are security devices and (ACL-2)
mechanisms deployed in the network infrastructure and Lab – EIGRP Configuration
managed by the network operations center (NOC).
TS – VLAN Sim Troubleshooting

TS – DHCP Sim Troubleshooting


5. What name is given to hackers who hack for a political
or social cause? TS – GRE Multilink
Troubleshooting
White hat
Hacker TS – RIPv2 Troubleshooting Sim
Hacktivist * TS – EIGRP Troubleshooting Sim
Blue hat
TS – OSPF Troubleshooting Sim
Basic Questions

C. The term is used to describe gray hat hackers who Basic Questions 2
rally and protect for a cause. OSI TCP/IP Model Questions

Cloud & Virtual Services


6. Which organization is an international nonprofit WAN Questions
organization that offers the CISSP certification? » Show Full List
(ISC)2 *
Drag and Drop Questions
IEEE
GIAC
CompTIA

A. (ISC)2 is an international nonprofit organization that


offers the CISSP certification.

7. After a security incident is verified in a SOC, an


incident responder reviewsthe incident but cannot
identify the source of the incident and form an effective
mitigation procedure. To whom should the incident ticket
6be escalated?

https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 4/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

A cyberoperations analyst for help


An SME for further investigation *
An alert analyst for further analysis
The SOC manager to ask for other personnel to be
assigned

B. An incident responder is a Tier 2 security professional


in an SOC. If the responder cannot resolve the incident
ticket, the incident ticket should be escalated to the next-
tier support, a Tier 3 subject matter expert. A Tier 3 SME
would further investigate the incident.

8. The term Alert Analyst refers to which group of


personnel in an SOC?
Tier 1 personnel *
Tier 2 personnel
Tier 3 personnel
SOC managers

A. In a typical SOC, the Tier 1 personnel are called alert


analysts, also known as cyberoperations analysts.

9. What is a rogue wireless hotspot?


It is a hotspot that was set up with outdated devices.
It is a hotspot that does not encrypt network user traffic.
It is a hotspot that does not implement strong user
authentication mechanisms.
It is a hotspot that appears to be from a legitimate
business but was actually set up by someone without
the permission from the business. *

D. A rogue wireless hotspot is a wireless access point


running in a business or an organization without the
official permission from the business or organization.

10. What is a potential risk when using a free and open


wireless hotspot in a public location?
6
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 5/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

Too many users trying to connect to the Internet may


cause a network traffic jam.
The Internet connection can become too slow when many
users access the wireless hotspot.
Network traffic might be hijacked and information
stolen.
Purchase of products from vendors might be required in
exchange for the Internet access.

11. How does a security information and event


management system (SIEM) in a SOC help the personnel
fight against security threats?
by integrating all security devices and appliances in an
organization
by analyzing logging data in real time
by combining data from multiple technologies
by dynamically implementing firewall rules

A security information and event management system


(SIEM) combines data from multiple sources to help SOC
personnel collect and filter data, detect and classify
threats, analyze and investigate threats, and manage
resources to implement preventive measures.

12. Which statement best describes a motivation of


hacktivists?
They are part of a protest group behind a political
cause.
They are curious and learning hacking skills.
They are trying to show off their hacking skills.
They are interested in discovering new exploits.

Each type of cybercriminal has a distinct motivation for


his or her actions.

13. If a SOC has a goal of 99.999% uptime, how many


minutes of downtime a year would be considered within
its goal?
6 Approximately 5 minutes per year.
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 6/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

Approximately 10 minutes per year.


Approximately 20 minutes per year.
Approximately 30 minutes per year.

Within a year, there are 365 days x 24 hours a day x 60


minutes per hour = 525,600 minutes. With the goal of
uptime 99.999% of time, the downtime needs to be
controlled under 525,600 x (1-0.99999) = 5.256 minutes a
year.

14. Why do IoT devices pose a greater risk than other


computing devices on a network?
Most IoT devices do not require an Internet connection
and are unable to receive new updates.
IoT devices cannot function on an isolated network with
only an Internet connection.
Most IoT devices do not receive frequent firmware
updates.
IoT devices require unencrypted wireless connections.

IoT devices commonly operate using their original


firmware and do not receive updates as frequently as
laptops, desktops, and mobile platforms.

15. Which two services are provided by security


operations centers? (Choose two.)
managing comprehensive threat solutions
ensuring secure routing packet exchanges
responding to data center physical break-ins
monitoring network security threats
providing secure Internet connections

Security operations centers (SOCs) can provide a broad


range of services to defend against threats to information
systems of an organization. These services include
monitoring threats to network security and managing
comprehensive solutions to fight against threats.

6 Ensuring secure routing exchanges and providing secure

https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 7/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

Internet connections are tasks typically performed by a


network operations center (NOC). Responding to facility
break-ins is typically the function and responsibility of the
local police department.

16. Users report that a database file on the main server


cannot be accessed. A database administrator verifies
the issue and notices that the database file is now
encrypted. The organization receives a threatening email
demanding payment for the decryption of the database
file. What type of attack has the organization
experienced?
man-in-the-middle attack
DoS attack
ransomware
Trojan horse

A cybersecurity specialist needs to be familiar with the


characteristics of the different types of malware and
attacks that threaten an organization.

17. Which organization offers the vendor-neutral CySA+


certification?
IEEE
CompTIA
(ISC)²
GIAC

18. What was used as a cyberwarfare weapon to attack a


uranium enrichment facility in Iran?
DDoS
SQL injection
PSYOPS
Stuxnet

The Stuxnet malware program is an excellent example of


a sophisticated cyberwarfare weapon. In 2010, it was

6
used to attack programmable logic controllers that
operated uranium enrichment centrifuges in Iran.
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 8/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

19. Which three technologies should be included in a


SOC security information and event management
system? (Choose three.)
firewall appliance
security monitoring
log management
intrusion prevention
proxy service
threat intelligence

Technologies in a SOC should include the following:


• Event collection, correlation, and analysis
• Security monitoring
• Security control
• Log management
• Vulnerability assessment
• Vulnerability tracking
• Threat intelligence
Proxy server, VPN, and IPS are security devices
deployed in the network infrastructure.

20. Which personnel in a SOC is assigned the task of


verifying whether an alert triggered by monitoring
software represents a true security incident?
SOC Manager
Tier 2 personnel
Tier 3 personnel
Tier 1 personnel

In a SOC, the job of a Tier 1 Alert Analyst includes


monitoring incoming alerts and verifying that a true
security incident has occurred.

21. Which statement describes cyberwarfare?


Cyberwarfare is an attack carried out by a group of script
kiddies.
It is a series of personal protective equipment developed
6 for soldiers involved in nuclear war.
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 9/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

It is simulation software for Air Force pilots that allows


them to practice under a simulated war scenario.
It is Internet-based conflict that involves the
penetration of information systems of other nations.

Cyberwarfare is Internet-based conflict that involves the


penetration of the networks and computer systems of
other nations. Organized hackers are typically involved in
such an attack.

22. in the operation of a SOC, which system is frequently


used to let an analyst select alerts from a pool to
investigate?
syslog server
registration system
ticketing system
security alert knowledge-based system

In a SOC, a ticketing system is typically used for a work


flow management system.

23. What name is given to an amateur hacker?


red hat
script kiddie
black hat
blue team

Script kiddies is a term used to describe inexperienced


hackers

24. Which personnel in a SOC are assigned the task of


hunting for potential threats and implementing threat
detection tools?
Tier 1 Analyst
SOC Manager
Tier 2 Incident Reporter

6 Tier 3 SME

https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 10/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

In a SOC, Tier 3 SMEs have expert-level skills in


network, endpoint, threat intelligence, and malware
reverse engineering (RE). They are deeply involved in
hunting for potential security threats and implementing
threat detection tools.

25. Match the components to the major categories in a


SOC.
Question:

Answer:

Download PDF File below:

6
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 11/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

This content is locked!


Please support us, use one of the buttons below to unlock the content.

 like
Like 42  tweet
Tweet

 share
Share 42 errorfol
  share
Share

or wait 185s

100% Pass CCNA R&S Exam


Real Exam Questions & Answers
100% Pass Your Exam with SPOTO CCNA Dumps with Real Exam
Questions & Answers.

spotoclub.com OPEN

Related Articles

6
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 12/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

100% Free CISSP CCNA Security v2.0 ZIPcrypt Encryption Quiz Chapter 11-13
Test - Real Exam Chapter 1 Exam Utility - Easily encrypt CCNA CyberOps
Questions & Answers Answers and send les Version 1.1 Answers

Ad spotoclub.com itexamanswers.net Ad softpedia.com itexamanswers.net

Virtual Hacking Labs Introduction to CCNA 1 (v5.1 + v6.0) CCNA Security 2.0
- Penetration Testing Cybersecurity v2 EOC Chapter 1 Exam Study Material –
Platform Assessment - Final… Answers 2019 -… Chapter 1: Modern
Network Security…
Ad virtualhackinglabs.com itexamanswers.net itexamanswers.net itexamanswers.net

1 Leave a Reply

Join the discussion...

1 0 0  

 1

 newest  oldest

min 

Which three technologies should be included in a SOC


Guest security information and event management system?

6 (Choose three.)

https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 13/14
9/27/2019 CCNA Cyber Ops (Version 1.1) - Chapter 1 Exam Answers Full

Options are :
firewall appliance
intrusion prevention
log management
security monitoring
proxy service
threat intelligence

 Reply  3 days ago

Copyright © 2019. Privacy Policy | Contact | Theme by MyThemeShop

6
https://itexamanswers.net/ccna-cyber-ops-chapter-1-exam-answers-full.html 14/14

Das könnte Ihnen auch gefallen