210-255 Exam - Implementing Cisco Cybersecurity Operations

certleader.com

Q1. Which feature is used to find possible vulnerable services running on a server?

A. CPU utilization

B. security policy

C. temporary internet files

D. listening ports

Answer: D

Q2. Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?

A. confidentiality

B. integrity

C. availability

D. complexity

Answer: A

Q3. Which description of a retrospective maKvare detection is true?

A. You use Wireshark to identify the malware source.

B. You use historical information from one or more sources to identify the affected host or file.

C. You use information from a network analyzer to identify the malware source.

D. You use Wireshark to identify the affected host or file.

Answer: B

Q4. Which feature is used to find possible vulnerable services running on a server?

A. CPU utilization

B. security policy

C. temporary internet files

D. listening ports

Answer: D

Q5. Which process is being utilized when IPS events are removed to improve data integrity?

A. data normalization

B. data availability

C. data protection

D. data signature

Answer: B

Q6. Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?

A. URL

B. hash

C. IP address

D. destination port

Answer: C

Q7. In the context of incident handling phases, which two activities fall under scoping? (Choose two.)

A. determining the number of attackers that are associated with a security incident

B. ascertaining the number and types of vulnerabilities on your network

C. identifying the extent that a security incident is impacting protected resources on the network

D. determining what and how much data may have been affected

E. identifying the attackers that are associated with a security incident

Answer: D,E

Q8. Which option has a drastic impact on network traffic because it can cause legitimate traffic to be blocked?

A. true positive

B. true negative

C. false positive

D. false negative

Answer: A

Q9. Which data element must be protected with regards to PCI?

A. past health condition

B. geographic location

C. full name

D. recent payment amount

Answer: D

Q10. Which identifies both the source and destination location?

A. IP address

B. URL

C. ports

D. MAC address

Answer: C