Which IDS system can detect attacks using encryption?
A. Network IDS deployed in inline mode
B. Network IDS deployed in promiscuous mode
C. Host-based IDS
D. Network IPS deployed in inline mode
Which of the following are public key standards?
A. IPsec
B. PKCS #10
C. PKCS #12
D. ISO33012
Which data handling concept pertains to securing artifacts against change?
A. integrity
B. chain of custody
C. risk
D. nonrepudiation
Which description is an example of whaling?
A. when attackers target a group of individuals
B. when attackers use fraudulent websites that look like legitimate ones
C. when attackers target specific individuals
D. when attackers go after the CEO
Which tool is commonly used in a Security Operations Center to aggregate logs sent by endpoint systems, firewalls, intrusion prevention systems, and NetFlow?
A. Cybersecurity Event Management
B. Security Information and Event Management system
C. Firepower Management Center
D. Security Information Management System
What happens when a file hash has never been seen by Cisco's cloud malware analysis system?
A. An unknown disposition status is returned, and the file is automatically submitted to the cloud for dynamic analysis.
B. An unknown disposition status is returned, and the file is automatically stored on the local firewall SSD module.
C. The file is sent directly to Cisco for analysis
D. A CVE is automatically generated for the file, and uploaded to the cloud for dynamic analysis.
E. The file is quietly discarded and the end user is alerted to the presence of malware.
What would be the maximum length of the network mask for a network that has four hosts?
A. /27
B. /30
C. /24
D. /29
Which one of the following options is the routing protocol that is usually used between the major ISPs?
A. BGP
B. OSPF
C. IS-IS
D. EIGRP
E. OSPF or IS-IS
Which directory is commonly used on Linux systems to store log files, including syslog and apache access logs?
A. /etc/log
B. /root/log
C. /lib/log
D. /var/log
Which of the following access control models use security labels to make access decisions?
A. Mandatory access control (MAC)
B. Role-based access control (RBAC)
C. Identity-based access control (IBAC)
D. Discretionary access control (DAC)