Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Questions and Answers
Question 9
Drag and drop the uses on the left onto the type of security system on the right.
Options:
Answer:
Question 10
Refer to the exhibit.
What is depicted in the exhibit?
Options:
A.
Windows Event logs
B.
Apache logs
C.
IIS logs
D.
UNIX-based syslog
Answer:
B
Explanation:
Explanation:
The exhibit shows a UNIX command being used to filter data from an Apache access log file. The use of “cat” to display the content of the log file, “grep” to filter specific IP addresses, and “cut” to organize the output are all indicative of operations performed on a UNIX-based system. Additionally, the structure of the logs (GET requests) aligns with the format typically found in Apache server logs. References := The Cisco Cybersecurity source documents or study guide are not directly referenced here as I need to search for specific content related to this question.
Question 11
What is the difference between the ACK flag and the RST flag?
Options:
A.
The RST flag approves the connection, and the ACK flag terminates spontaneous connections.
B.
The ACK flag confirms the received segment, and the RST flag terminates the connection.
C.
The RST flag approves the connection, and the ACK flag indicates that a packet needs to be resent
D.
The ACK flag marks the connection as reliable, and the RST flag indicates the failure within TCP Handshake
Answer:
B
Explanation:
Explanation:
In TCP/IP networking, the ACK flag is used to acknowledge the receipt of a packet. It’s a way to confirm that the previous packets have been received and that the connection is proceeding as expected. The RST flag, on the other hand, is used to reset the connection. It is sent if a segment arrives which is not intended for the current connection, or if a connection request is to be denied. Essentially, the ACK flag is about maintaining the established connection, while the RST flag is about aborting connections that are not valid or are no longer needed123.
References: The information provided is based on standard TCP/IP protocol behavior as described in networking resources and Cisco’s cybersecurity documentation
Question 12
How is NetFlow different from traffic mirroring?
Options:
A.
NetFlow collects metadata and traffic mirroring clones data.
B.
Traffic mirroring impacts switch performance and NetFlow does not.
C.
Traffic mirroring costs less to operate than NetFlow.
D.
NetFlow generates more data than traffic mirroring.
Answer:
A
Explanation:
Explanation:
NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network traffic. It collects metadata of the IP traffic flowing across networking devices like routers and switches. On the other hand, Traffic mirroring involves capturing all the data packets that flow through a particular point in the network to analyze or inspect them later. References := Cisco Cybersecurity Operations Fundamentals