CyberOps Associate Security Policies and Procedures Questions

Cisco CyberOps Associate Practice Test 11

Cisco Certified CyberOps Associate

1 / 10

Which Cisco tool provides sandboxing and dynamic analysis for suspicious files?

2 / 10

A SIEM generates many false positives. Which tuning method is most effective to reduce noise while keeping true alerts?v

3 / 10

Which type of evidence includes router configuration files and firewall logs?

4 / 10

Which statement best describes the concept of “threat hunting”?

5 / 10

In the kill chain model, which phase involves delivering a malicious file through phishing email?

6 / 10

Which type of log file is most useful for detecting brute-force login attempts?

7 / 10

What kind of malware disguises itself as legitimate software but performs malicious actions once installed?

8 / 10

Which protocol is primarily used to provide integrity and authentication for syslog messages?

9 / 10

Which network security device inspects SSL/TLS traffic by acting as a proxy between client and server?

10 / 10

Which of the following describes the role of a SOC Tier 1 analyst?

Your score is

The average score is 80%

0%