CyberOps Associate Security Concepts Questions

Cisco CyberOps Associate Practice Test 7

Cisco Certified CyberOps Associate

1 / 10

In the context of the Cyber Kill Chain, what is the weaponization phase?

2 / 10

Which of the following is a host-based analysis tool on Windows that can be used to view detailed information about processes, including their associated DLLs and open handles?

3 / 10

A security team has deployed a physical device that sits between the internal network and the internet. Its primary function is to inspect and filter network traffic based on a set of rules. What is this device called?

4 / 10

What is the purpose of a hash function in cybersecurity?

5 / 10

A security analyst receives a log alert indicating that a user account has been locked out after multiple failed login attempts. This is a common indicator of what type of attack?

6 / 10

Which of the following is a key component of a data loss prevention (DLP) strategy?

7 / 10

In a digital forensics investigation, which of the following is considered the most volatile type of evidence?

8 / 10

What is the primary purpose of a Security Orchestration, Automation, and Response (SOAR) platform?

9 / 10

A security analyst is analyzing packet captures and notices a large number of packets with the FIN, PSH, and URG flags set. This is a common signature for what type of port scan?

10 / 10

Which of the following best describes the difference between a Trojan horse and a virus?

Your score is

The average score is 95%

0%