CyberOps Associate Host-based Analysis Questions

Cisco CyberOps Associate Practice Test 9

Cisco Certified CyberOps Associate

1 / 10

Which protocol header field might you inspect to detect ICMP flood attack?

2 / 10

What is a false negative in intrusion detection systems?

3 / 10

In a PCAP analysis, which fields are essential in the 5-tuple approach?

4 / 10

Which of these is considered a threat actor?

5 / 10

What’s a primary challenge of data visibility when monitoring across hosts and cloud environments?

6 / 10

Which kind of certificate component indicates which asymmetric algorithm is used and which hash for signing?

7 / 10

What does “sliding window anomaly detection” aim to do in security analytics?

8 / 10

In the CVSS framework, what does “attack vector” refer to?

9 / 10

Which technique is part of threat hunting?

10 / 10

In a firewall context, what is the difference between stateful firewall and packet filtering?

Your score is

The average score is 90%

0%