Tuesday, May 25, 2021

Cyberops Chapter 10 Exam Answers


  • Gramm-Leach-Bliley Act GLBA — established that financial institutions must ensure the security and confidentiality of customer information; protect against any anticipated threats or hazards to the security or integrity of such information;...
    Link: https://oracle.com/webfolder/technetwork/tutorials/tutorial/cloud/pbcs/1711-pbcs-wn.htm


  • It is the detection of malware against a central vulnerability research center. It is the identification of threats and vulnerabilities and the matching of threats with vulnerabilities. Explanation: A mandatory activity in risk assessment is the...
    Link: https://eric.ed.gov/?id=ED178591
  • The net command is a very important command in Windows. Some common net commands include the following: net accounts: Sets password and logon requirements for users net session: Lists or disconnects sessions between a computer and other computers on the network net share: Creates, removes, or manages shared resourcesnet start: Starts a network service or lists running network services net stop: Stops a network service net use: Connects, disconnects, and displays information about shared network resources net view: Shows a list of computers and network devices on the network 3.
    Link: https://reddit.com/r/UofT/comments/lrtqek/new_to_online_exams_using_word_document_during_a/
  • Which type of startup must be selected for a service that should run each time the computer is booted? An automatic startup will start the service automatically when the PC starts. The manual startup process will occur when the application is launched by a user. There is no boot, start, or startup service type that can be configured. A user creates a file with a. What type of file is it?
    Link: https://exam4tests.com/oracle-cloud-infrastructure-2019-architect-associate-cram11279.html
  • Which Windows version was the first to introduce a bit Windows operating system? There are more than 20 releases and versions of the Windows operating system. The Windows XP release introduced bit processing to Windows computing. Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping? The default gateway device is configured with the wrong IP address. The default gateway is not operational. Security rules are applied to the default gateway device, preventing it from processing ping requests. If the ping from one host to another host on a remote network is successful, this indicates that the default gateway is operational. In this scenario, if a ping from one host to the default gateway failed, it is possible that some security features are applied to the router interface, preventing it from responding to ping requests.
    Link: https://aakash.ac.in/study-planner-and-test-plannerxiicfoymapril-july-20-21-1-min
  • Which command is used to manually query a DNS server to resolve a specific hostname? The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives. How much RAM is addressable by a bit version of Windows? A bit operating system is capable of supporting approximately 4 GB of memory. How can a user prevent specific applications from accessing a Windowscomputer over a network?
    Link: https://topuniversities.com/student-info/admissions-advice/graduate-admissions-tests-glance-gmat-gre-lsat-toefl-ielts
  • Enable MAC address filtering. Disable automatic IP address assignment. Disabling automatic IP address assignment may result in the computer not being able to connect to the network at all. Enabling MAC address filtering is not possible in Windows and would only block specific network hosts, not applications. Changing default usernames and passwords will secure the computer from unauthorized users, not from applications. What utility is used to show the system resources consumed by each user? The Windows Task Manager utility includes a Users tab from which the system resources consumed by each user can be displayed. What utility is available on a Windows PC to view current running applications and processes?
    Link: https://physicstutorials.org/home/exams/waves-exams-and-solutions
  • Which software utility can the technician use to diagnose the problem? This list can provide important verification and troubleshooting information. The Netstat utility is used to identify which active TCP connections are open and running on a networked host. Nslookup is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers. Where are the settings that are chosen during the installation process stored? What technology was created to replace the BIOS program on modern personal computer motherboards? Which two things can be determined by using the ping command? Choose two. This can be a measure of network performance.
    Link: https://pinkbike.com/news/field-test-stumpjumper-vs-remedy-vs-process-vs-bronson-vs-sb150-editors-choice.html
  • It helps a user identify possible malware connections. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result. Nslookup is a tool for testing and troubleshooting DNS servers. Refer to the exhibit. A cyber security administrator is attempting to view system information from the Windows PowerShell and recieves the error message shown. What action does the administrator need to take to successfully run the command? Run the command from the command prompt. Install latest Windows updates.
    Link: https://webmd.com/a-to-z-guides/qa/what-is-a-parathyroid-hormone-pth-blood-test
  • Restart the abno service in Task Manager. Run PowerShell as administrator. Best practices advise not to log into systems with an administrator account, but rather a user account. When logged in as a user it is possible to run Windows utilitites, such as PowerShell and the Command Prompt as an administrator by right clicking on the utility and slecting Run as Administrator. A cybersecurity analyst is investigating a reported security incident on a Microsoft Windows computer. Which tool is the analyst using? Events show the date and time that the event occurred along with the source of the event. For security reasons a network administrator needs to ensure that local computers cannot ping each other.
    Link: https://workshopper.com/post/design-sprint-101
  • Which settings can accomplish this task? MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types. Desktop represents the current file directory. The mydocu. Which two user accounts are automatically created when a user installs Windows to a new computer? What term is used to describe a logical drive that can be formatted to store data? Partitions are logical portions of the disk that can be formatted to store data.
    Link: https://nyit.edu/files/ctl/CTL_BbExamConverter_SampleExamWithInstructions_05.14.2020.docx
  • CompTIA A. After a security incident is verified in a SOC, an incident responder reviewsthe incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated? An incident responder is a Tier 2 security professional in an SOC. If the responder cannot resolve the incident ticket, the incident ticket should be escalated to the next-tier support, a Tier 3 subject matter expert. A Tier 3 SME would further investigate the incident. In a typical SOC, the Tier 1 personnel are called alert analysts, also known as cyberoperations analysts. What is a rogue wireless hotspot? It is a hotspot that was set up with outdated devices. It is a hotspot that does not encrypt network user traffic. It is a hotspot that does not implement strong user authentication mechanisms. It is a hotspot that appears to be from a legitimate business but was actually set up by someone without the permission from the business.
    Link: https://wordstream.com/google-my-business

No comments:

Post a Comment

Preferred Freelancer Program Sla Exam Answers 2021

[GET] Preferred Freelancer Program Sla Exam Answers 2021 | HOT! We provide excellent services, engagement, and advanced materials that empo...