Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber security Operations exam Fundamentals UPDATED Study Guide QUESTIONS AND CORRECT ANSWERS

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
23-11-2025
Written in
2025/2026

Cyber security Operations exam Fundamentals UPDATED Study Guide QUESTIONS AND CORRECT ANSWERS Which three technologies should be included in a security information and event management system in a soc - CORRECT ANSWERS Security monitoring. Intrusion prevention. Vulnerability tracking.

Show more Read less
Institution
Course

Content preview

Cyber security Operations exam
Fundamentals UPDATED Study Guide
QUESTIONS AND CORRECT ANSWERS
Which three technologies should be included in a security information and
event management system in a soc - CORRECT ANSWERS Security
monitoring
Threat intelligence
Vulnerability tracking


How is a source IP address used in a standard ACL? - CORRECT ANSWERS
it is the criterion used to filter traffic


Why is Diffie-Hellman algorithm typically avoided for encrypting data? -
CORRECT ANSWERS The large numbers used by DH make it slow for
bulk data transfers


Which metric class in the CVSS Basic Metric Group identifies the impacts on
Confidentiality, Integrity and Availability? - CORRECT ANSWERS
Impact


How might DNS be used by a threat actor to create mayhem? - CORRECT
ANSWERS Collect personal information and encodes the data in
outgoing DNS queries


Refer to the exhibit. A network security specialist issues the command tcpdump
to capture events. What does the number 6337 indicate? - CORRECT
ANSWERS The process id of the tcpdump command

,What is the responsibility of the human resources department when handling a
security incident? - CORRECT ANSWERS Apply disciplinary measures
if an incident is caused by an employee


Malicious traffic is correctly identified as a threat. (malware) - CORRECT
ANSWERS true positive


Normal traffic is incorrectly identified as a threat. (email) - CORRECT
ANSWERS false positive


Uses a hierarchy of authoritative time sources to send term information between
devices on the network. - CORRECT ANSWERS NTP


Uses UDP port 514 for logging event messages from network devices and
endpoints. - CORRECT ANSWERS Syslog


Used by attackers to identify hosts on a network and the structure of the
network. - CORRECT ANSWERS ICMP


Which technique could be used by security personnel to analyse a suspicious
file in a safe environment?


sandboxing


blacklisting


baselining


whitelisting

, Navigation Bar - CORRECT ANSWERS sandboxing


Why does HTTPS technology add complexity to network security monitoring?


HTTPS dynamically changes the port number on the web server.


HTTPS conceals data traffic through end-to-end encryption.


HTTPS uses tunneling technology for confidentiality.


HTTPS hides the true source IP address using NAT/PAT. - CORRECT
ANSWERS HTTPS conceals data traffic through end to end encryption


Which type of firewall is a combination of various firewall types?


proxy


packet filtering


stateful


hybrid


Navigation Bar - CORRECT ANSWERS hybrid


What is the first line of defence when an organisation is using a defence-in-
depth approach to network security?

Written for

Course

Document information

Uploaded on
November 23, 2025
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
nzomokelvin15

Get to know the seller

Seller avatar
nzomokelvin15 Stanford University
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
8 months
Number of followers
0
Documents
1511
Last sold
5 days ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions