24 25
24 25
24 25
ACL
Encryption
Tunneling
NAT/Pat
P2P
2. Which of the following can be defeated by packets containing spoofed IP addresses?
P2P
TOR
ACL
encryption
NAT/PAT
3. Which of the following makes message contents and file attachments unreadable?
NAT/PAT
TOR
Load balancing
Encryption
ACL
4. Which of the following hides identity details of users who are browsing the web?
TOR
P2P
ACL
NAT/PAT
Load balancing
1. Which of the following can carry malware payloads into the network?
DNS
HTTPS
IMAP
syslog
SMTP
2. Which of the following presents challenges to decoding packet captures?
HTTPS
DNS
SMTP
syslog
NTP
3. Which of the following can be used to exfiltrate data hidden in the query messages?
IMAP
NTP
SMTP
DNS
syslog
4. Time stamps that are provided by which protocol may be corrupted to complicate event correlation?
syslog
SMTP
NTP
DNS
HTTPS
1. A cyberanalyst is reviewing an entry-point ACL. What three types of ICMP traffic should be allowed
to access an internal network from the internet? (Choose three.)
reply
squelch
request
time exceeded
destination unreachable
ping
2. A company decides to purchase a device capable of managing load balancing so that traffic will be
distributed between their servers. What could be a potential problem using the new device on the
network?
It will require the purchase of more servers so that existing servers are not overwhelmed.
It will cause extra traffic going to a server resource that is not available.
3. What method allows VPN traffic to remain confidential?
authentication
encryption
verification
encapsulation
4. To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an
outside interface?
router advertisement
echo reply
echo request
time-stamp request
time-stamp reply
5. In which way does the use of HTTPS increase the security monitoring challenges within enterprise
networks?
HTTPS traffic can carry a much larger data payload than HTTP can carry.
proxy
DHCP
syslog
7. Which network service synchronizes the time across all devices on the network?
SNMP
NetFlow
syslog
NTP
8. What port number would be used if a threat actor was using NTP to direct DDoS attacks?
69
25
123
443
9. Which protocol is used to send e-mail messages between two servers that are in different e-mail
domains?
HTTP
POP3
IMAP4
SMTP
10. How do cybercriminals make use of a malicious iFrame?
The iFrame allows the browser to load a web page from another source.
11. Which type of server daemon accepts messages sent by network devices to create a collection of
log entries?
AAA
NTP
SSH
syslog
12. What type of server can threat actors use DNS to communicate with?
database
CnC
NTP
web
13. Which statement describes the function provided by the Tor network?
It hides internal IP addresses by allowing them to share one or a few outside IP addresses.
1. Which type of network monitoring data includes detailed protocol and payload information for all
traffic on a network segment?
full-packet capture
transaction data
session data
alert data
extracted content
statistical data
2. What type of network monitoring data summarizes or analyzes network flow or performance data?
full-packet capture
transaction data
session data
alert data
extracted content
statistical data
3. What type of network monitoring data includes device-specific server and host logs?
full-packet capture
transaction data
session data
alert data
extracted content
statistical data
4. What type of network monitoring data includes files that are attached to emails or that were
downloaded from the internet?
full-packet capture
transaction data
session data
alert data
extracted content
statistical data
5. What type of network monitoring data contains details of network flows including the 5-tuples the
amount of data transmitted and the duration of data transmission?
full-packet capture
transaction data
session data
alert data
extracted content
statistical data
6. What type of network monitoring data is generated by IPS or IDS devices when suspicious traffic is
detected?
full-packet capture
transaction data
session data
alert data
extracted content
statistical data
1. What Windows security level is logged when a remote login was unsuccessfully attempted by an
unauthorized user?
Error
Fatal
Warning
Information
Success Audit
Failure Audit
2. What Windows security level is logged when a process that is required has successfully loaded on a
workstation?
Error
Fatal
Warning
Information
Success Audit
Failure Audit
3. What Windows security level is logged when a disk error has occurred during a backup operation?
Error
Fatal
Warning
Information
Success Audit
Failure Audit
4. What Windows security level is logged when disk space is getting low?
Error
Fatal
Warning
Information
Success Audit
Failure Audit
5. What Windows security level is logged when an authorized user logs in remotely to a system?
Error
Fatal
Warning
Information
Success Audit
Failure Audit
NetFlow
tcpdump
Proxy Logs
Syslog
2. What two values are part of all NetFlow flow records? (Choose two.)
beginning timestamp
ending timestamp
application identifiers
3. What does Application Visibility and Control (AVC) use to discover the applications that are
responsible for network traffic?
NBAR2
full packet captures
DNS logs
NetFlow
tcpdump
NBAR2
1. What type of event occurs when malicious activity that can affect the availability, integrity and
confidentiality of a host and its data occurs?
Intrusion
Host or Endpoint
NetFlow
Configuration
Network Discovery
Connection
2. What kind of event is logged when a host first appears on the network?
Intrusion
Host or Endpoint
NetFlow
Configuration
Network Discovery
Connection
3. What type of event is used when NetFlow detects a new host on the network?
Intrusion
Host or Endpoint
NetFlow
Configuration
Network Discovery
Connection
4. Which type of events concern sessions between hosts that is discovered by the NextGen Firewall
directly?
Intrusion
Host or Endpoint
NetFlow
Configuration
Network Discovery
Connection
5. What type of event occurs when changes are detected to network hosts and applications that are
known to the network?
Intrusion
Host or Endpoint
NetFlow
Configuration
Network Discovery
Connection
Task Manager
Device Manager
Event Viewer
Services
3. Which type of security data can be used to describe or predict network behavior?
alert
session
statistical
transaction
4. Which statement describes the tcpdump tool?
It can be used to analyze network log data in order to describe and predict network behavior.
5. What are two popular SIEM platforms? (Choose two.)
Splunk
NetFlow
Cisco Umbrella
tcpdump
6. Which Windows host log event type describes the successful operation of an application, driver, or
service?
error
information
success audit
warning
7. Which Windows log records events related to login attempts and operations related to file or object
access?
system logs
security logs
setup logs
application logs
8. What are two of the 5-tuples? (Choose two.)
IDS
protocol
source port
IPS
ACL
9. In a Cisco AVC system, in which module is NBAR2 deployed?
Application Recognition
Control
Metrics Collection
10. A NIDS/NIPS has identified a threat. Which type of security data will be generated and sent to a
logging device?
transaction
session
statistical
alert
11. Which statement describes an operational characteristic of NetFlow?
NetFlow collects basic information about the packet flow, not the flow data itself.
12. Which type of data is used by Cisco Cognitive Intelligence to find malicious activity that has
bypassed security controls, or entered through unmonitored channels, and is operating inside an
enterprise network?
session
alert
transaction
statistical