Cisco 200-201 Test Bank

Cisco CyberOps Associate Practice Test 6

Cisco Certified CyberOps Associate

1 / 10

What is the primary purpose of a security governance framework like the NIST Cybersecurity Framework?

2 / 10

Which of the following is an example of an access control model that uses rules based on attributes of the user, resource, or environment?

3 / 10

A security analyst is performing a network intrusion analysis and wants to determine the location of a source IP address. Which type of tool would be most effective for this?

4 / 10

What is the purpose of a keylogger?

5 / 10

Which of the following is a security policy that outlines the rules for how employees can use company computers, networks, and resources?

6 / 10

A security analyst is analyzing a web server log and finds multiple log entries indicating attempts to inject malicious code into a form field. What type of attack is this?

7 / 10

Which of the following best describes the difference between an IDS and an IPS?

8 / 10

In the context of the TCP header, which flag is used to synchronize sequence numbers and initiate a connection?

9 / 10

Which of the following is a primary function of the ps command on a Linux system?

10 / 10

A security team is investigating a host that is behaving suspiciously. They find that a malicious process has been hidden from the operating system's process list. What type of malware is designed to conceal its presence in this manner?

Your score is

The average score is 90%

0%