Cybersecurity v1.1 Module 4
Quiz
This quiz covers the content of the videos presented in Cybersecurity
Module 4. This quiz is designed for practice. You will be allowed
multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some
task types, partial credit scoring is allowed to foster learning. Please note
that on tasks with multiple answers, points can be deducted
for selecting incorrect options.
Short answer or essay questions may appear on
some of the quizzes. These questions are designed for self-assessment and
reflection and are not scored. Sample answers are provided
for self-evaluation.
At the completion of the quiz, some items may display feedback. The
feedback will reference the source of the content. Example: Refer to
curriculum topic: 1.2.0 - indicates that the source of the material for this
task is in module 1, presentation 2.
Pregunta 1
Which two tools used for incident detection can be used to detect anomalous
behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
intrusion
detection system
|
||
FireEye
|
||
NetFlow
|
||
DDoS
|
||
ping
|
Pregunta 2
Refer to the exhibit. Fill in the blank.
Cisco CSIRT uses a software platform called to detect advanced malware and compromised hosts in a sandbox environment.
Pregunta 3
Refer to the exhibit. Rearrange the letters to fill in the blank.
Behavior-based analysis involves using baseline information to detect that could indicate an attack.
Pregunta 4
Which protocol is used by the Cisco Cyberthreat Defense Solution to collect
information about the traffic that is traversing the network?
NetFlow
|
||
HTTPS
|
||
NAT
|
||
Telnet
|
||
Pregunta 5
Which stage of the kill chain used by attackers focuses on the
identification and selection of targets?
delivery
|
||
exploitation
|
||
weaponization
|
||
reconnaissance
|
||
Pregunta 6
What is one main function of the Cisco Security Incident Response Team?
to design
polymorphic malware
|
||
to design next generation routers and switches that are less-prone to
cyberattacks
|
||
to provide standards for new encryption techniques
|
||
to minimize the time between a cyberattack and its discovery
|
||



Join OnlineITGuru to learn UI/UX design online. Create stunning interfaces, improve user experience, and build a strong portfolio for a digital design career.best ui ux design course online
ResponderEliminarLearn Java online with OnlineITGuru. From basics to advanced topics, master coding, OOP, databases, and build professional applications for your career.complete java course
ResponderEliminarMaster data modeling with OnlineITGuru. Design databases, create ER diagrams, apply normalization, and manage data efficiently for real-world applications.advanced data modeling
ResponderEliminarLearn DevOps online with OnlineITGuru. Implement CI/CD, automation, cloud deployment, and containerization to streamline software delivery and operations.devops online training
ResponderEliminarEasyPayTax delivers fast, reliable tax filing services online, ensuring compliance and maximizing your refunds with minimal effort. GST filing services in Hyderabad
ResponderEliminarEasyPayTax makes tax filing easy and stress-free with expert support, secure online processing, and accurate return submissions. online tax consultant in Hyderabad
ResponderEliminar"Boost your career with our comprehensive sales force developer training , designed for hands-on learning and real-world projects.
ResponderEliminarBoost your career with salesforce administrator training designed to equip you with hands-on skills in managing Salesforce platforms efficiently. Learn to streamline processes, customize dashboards, and enhance CRM performance with expert-led Salesforce Administrator Training.
ResponderEliminar