jueves, 9 de junio de 2016

Cybersecurity v1.1 Module 4 Quiz



Cybersecurity v1.1 Module 4 Quiz

This quiz covers the content of the videos presented in Cybersecurity Module 4. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.
 Principio del formulario

Pregunta 1  
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
intrusion detection system
FireEye

NetFlow
DDoS

ping

Pregunta 2  


Refer to the exhibit. Fill in the blank.
Cisco CSIRT uses a software platform called
to detect advanced malware and compromised hosts in a sandbox environment.


Pregunta 3   


Refer to the exhibit. Rearrange the letters to fill in the blank.
Behavior-based analysis involves using baseline information to detect
that could indicate an attack.


Pregunta 4   
Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?
NetFlow
HTTPS

NAT
Telnet


Pregunta 5
Which stage of the kill chain used by attackers focuses on the identification and selection of targets?
delivery
exploitation

weaponization
reconnaissance


Pregunta 6  

What is one main function of the Cisco Security Incident Response Team?
to design polymorphic malware
to design next generation routers and switches that are less-prone to cyberattacks

to provide standards for new encryption techniques
to minimize the time between a cyberattack and its discovery

No hay comentarios:

Publicar un comentario