CyberOps Associate Security Monitoring Questions

Cisco CyberOps Associate Practice Test 8

Cisco Certified CyberOps Associate

1 / 10

What is a main advantage of having full packet capture in network intrusion analysis?

2 / 10

Which regular expression might help detect suspicious HTTP requests with directory traversal attempts?

3 / 10

What is the purpose of a host-based intrusion detection system (HIDS)?

4 / 10

When analyzing host-based logs, which type of evidence is considered volatile and should be collected first?

5 / 10

Which of the following is a method attackers use to obfuscate or hide malicious activity in traffic?

6 / 10

In security monitoring, what kind of data does NetFlow provide?

7 / 10

Which access control model grants access based on attributes of both user and resource (e.g., environment, time, role)?

8 / 10

What does “runbook automation (RBA)” refer to in a security operations environment?

9 / 10

What is the main difference between agent-based and agentless protection on endpoints?

10 / 10

In the CIA triad, which element is primarily concerned with ensuring that data can be accessed when needed?

Your score is

The average score is 95%

0%