Cisco CyberOps Associate practice test

Cisco CyberOps Associate practice test

Cisco Certified CyberOps Associate

1 / 10

A network administrator wants to protect a critical server from unauthorized access. The security policy states that only administrators from a specific IP address range should be allowed to access it. Which security control would be most effective?

2 / 10

In the Cyber Kill Chain, which phase involves the attacker attempting to exploit a vulnerability on the target system?

3 / 10

An analyst is performing host-based forensics on a Windows machine. Which file system artifact can be used to determine the last time a file was accessed?

4 / 10

What is the purpose of a Security Operations Center (SOC)?

5 / 10

A user receives an email that appears to be from their bank, asking them to click a link and log in to verify their account information. What type of social engineering attack is this?

6 / 10

Which of the following describes the primary role of a Security Information and Event Management (SIEM) system?

7 / 10

Which of the following is a common method for an attacker to maintain persistence on a compromised host?

8 / 10

A security analyst needs to review network traffic to identify the source and destination IP addresses, and the ports used in a communication. Which of the following would be the most efficient tool for this?

9 / 10

What is the purpose of an Incident Response Plan?

10 / 10

A security analyst observes a large volume of DNS queries from an internal host to a suspicious domain. Which type of security tool would be most effective for detecting this type of behavior?

Your score is

The average score is 70%

0%