CyberOps Associate Troubleshooting Questions

Cisco CyberOps Associate Practice Test 12

Cisco Certified CyberOps Associate

1 / 10

Which protocol is commonly abused in amplification DDoS attacks because of its large response to small requests?

2 / 10

Which command in Windows shows all active network connections and listening ports?

3 / 10

Which type of intrusion detection system uses baselines to detect deviations in traffic patterns?

4 / 10

What is the purpose of a chain of custody form in digital forensics?

5 / 10

Which kind of malware spreads automatically without user interaction?

6 / 10

What is the main security concern with using SHA-1?

7 / 10

Which type of alerting method is best for high-priority, time-sensitive incidents in a SOC?

8 / 10

Which Linux command shows all listening TCP ports?

9 / 10

Which wireless attack forces clients to connect to a rogue access point by flooding deauthentication frames?

10 / 10

What is the primary function of NetFlow in security monitoring?

Your score is

The average score is 80%

0%