Cisco 200-201 - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Which security principle requires more than one person is required to perform a critical task?
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
How does a certificate authority impact security?
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
What is a difference between a threat and a risk?
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
An employee received an email from a colleague’s address asking for the password for the domain controller. The employee noticed a missing letter within the sender’s address. What does this incident describe?
What matches the regular expression c(rgr)+e?
A vulnerability analyst is performing the monthly scan data review Output data is very big and getting bigger each month The analyst decides to create a more efficient process to complete the task on time All false positives and true positives are excluded from the results The remaining findings will be assigned to a technical team for further remediation What is the result of such activity?
The SOC team detected an ongoing port scan. After investigation, the team concluded that the scan was targeting the company servers. According to the Cyber Kill Chain model, which step must be assigned to this type of event?
