Download Implementing Cisco Cybersecurity Operations.actualtests.210-255.2018-09-05.1e.78q.vcex

Download Exam

File Info

Exam Implementing Cisco Cybersecurity Operations
Number 210-255
File Name Implementing Cisco Cybersecurity Operations.actualtests.210-255.2018-09-05.1e.78q.vcex
Size 2.36 Mb
Posted September 05, 2018
Downloads 109
Download Implementing Cisco Cybersecurity Operations.actualtests.210-255.2018-09-05.1e.78q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

Which stakeholder group is responsible for containment, eradication, and recovery in incident handling?

  • A: facilitators
  • B: practitioners
  • C: leaders and managers
  • D: decision makers

Correct Answer: C

Question 2

Which two HTTP header fields relate to intrusion analysis? (Choose two.)

  • A: user-agent
  • B: host
  • C: connection
  • D: language
  • E: handshake type

Correct Answer: AB

Contains a characteristic string that allows the network protocol peers to identify the application type, operating system, software vendor or software version of the requesting software user agent. See also the Firefox user agent string reference. 
Specifies the domain name of the server (for virtual hosting), and (optionally) the TCP port number on which the server is listening.

Question 3

Which data type is protected under the PCI compliance framework?

  • A: credit card type
  • B: primary account number
  • C: health conditions
  • D: provision of individual care

Correct Answer: B

The goal of the PCI Data Security Standard (PCI DSS) is to protect cardholder data wherever it is processed, stored or transmitted. The security controls and processes required byPCI DSS are vitalfor protecting cardholder account data, including the PAN – the primary account number printed on the front of a payment card. 

Question 4

Which type of analysis allows you to see how likely an exploit could affect your network?

  • A: descriptive
  • B: casual
  • C: probabilistic
  • D: inferential

Correct Answer: C


Question 5

Which element is included in an incident response plan?

  • A: organization mission
  • B: junior analyst approval
  • C: day-to-day firefighting
  • D: siloed approach to communications

Correct Answer: A

Question 6

Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center?

  • A: Analysis Center
  • B: National CSIRT
  • C: Internal CSIRT
  • D: Physical Security

Correct Answer: C

Some general categories of CSIRTs include, but are not limited to, the following:
Internal CSIRTs provide incident handling services to their parent organization. This could be a CSIRT for a bank, a manufacturing company, a university, or a federal agency. 
National CSIRTs provide incident handling services to a country. Examples include: the Japan CERT Coordination Center (JPCERT/CC) or the Singapore Computer Emergency Response Team (SingCERT).
Coordination Centers coordinate and facilitate the handling of incidents across various CSIRTs. Examples include the CERT Coordination Center or the United States Computer Emergency Readiness Team (US-CERT). 
Analysis Centers focus on synthesizing data from various sources to determine trends and patterns in incident activity. This information can be used to help predict future activity or to provide early warning when the activity matches a set of previously determined characteristics. 
Vendor Teams handle reports of vulnerabilities in their software or hardware products. They may work within the organization to determine if their products are vulnerable and to develop remediation and mitigation strategies. A vendor team may also be the internal CSIRT for a vendor organization. 
Incident Response Providers offer incident handling services as a for-fee service to other organizations.

Question 7

Which option is a misuse variety per VERIS enumerations?

  • A: snooping
  • B: hacking
  • C: theft
  • D: assault

Correct Answer: B

Question 8

Which CVSSv3 metric captures the level of access that is required for a successful attack?

  • A: attack vector
  • B: attack complexity
  • C: privileges required
  • D: user interaction

Correct Answer: C

The new metric, Privileges Required, replaces the Authentication metric of v2.0. Instead of measuring thenumber of timesan attacker must separately authenticate to a system, Privileges Requiredcaptures thelevel of accessrequired for a successful attack. Specifically, the metric values High, Low, and None reflect the privileges required by an attacker in order to exploit the vulnerability. 

Question 9

Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?

  • A: confidentiality
  • B: integrity
  • C: availability
  • D: complexity

Correct Answer: C


Question 10

Which option can be addressed when using retrospective security techniques?

  • A: if the affected host needs a software update
  • B: how the malware entered our network
  • C: why the malware is still in our network
  • D: if the affected system needs replacement

Correct Answer: B





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX and EXAM files