Cybersecurity v1.1 Module 4
Quiz
This quiz covers the content of the videos presented in Cybersecurity
Module 4. This quiz is designed for practice. You will be allowed
multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some
task types, partial credit scoring is allowed to foster learning. Please note
that on tasks with multiple answers, points can be deducted
for selecting incorrect options.
Short answer or essay questions may appear on
some of the quizzes. These questions are designed for self-assessment and
reflection and are not scored. Sample answers are provided
for self-evaluation.
At the completion of the quiz, some items may display feedback. The
feedback will reference the source of the content. Example: Refer to
curriculum topic: 1.2.0 - indicates that the source of the material for this
task is in module 1, presentation 2.
Pregunta 1
Which two tools used for incident detection can be used to detect anomalous
behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
intrusion
detection system
|
||
FireEye
|
NetFlow
|
||
DDoS
|
ping
|
Pregunta 2
Refer to the exhibit. Fill in the blank.
Cisco CSIRT uses a software platform called to detect advanced malware and compromised hosts in a sandbox environment.
Pregunta 3
Refer to the exhibit. Rearrange the letters to fill in the blank.
Behavior-based analysis involves using baseline information to detect that could indicate an attack.
Pregunta 4
Which protocol is used by the Cisco Cyberthreat Defense Solution to collect
information about the traffic that is traversing the network?
NetFlow
|
||
HTTPS
|
NAT
|
||
Telnet
|
Pregunta 5
Which stage of the kill chain used by attackers focuses on the
identification and selection of targets?
delivery
|
||
exploitation
|
weaponization
|
||
reconnaissance
|
Pregunta 6
What is one main function of the Cisco Security Incident Response Team?
to design
polymorphic malware
|
||
to design next generation routers and switches that are less-prone to
cyberattacks
|
to provide standards for new encryption techniques
|
||
to minimize the time between a cyberattack and its discovery
|
No hay comentarios:
Publicar un comentario