Cisco Cyber Ops Chapter 7 Quiz
In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?
DoS
What technique is a security attack that depletes the pool of IP addresses available for legitimate hosts?
DHCP starvation
Which network monitoring technology collects IP operational data on packets flowing through Cisco routers and multilayer switches?
NetFlow
Which monitoring technology mirrors traffic flowing through a switch to an analysis device connected to another switch port?
SPAN
Which language is used to query a relational database?
SQL
Which technology is a proprietary SIEM system?
Splunk
Which network monitoring tool is in the category of network protocol analyzers?
Wireshark
Which network monitoring tool saves captured network frames in PCAP files?
Wireshark
Which SIEM function is associated with examining the logs and events of multiple systems to reduce the amount of time of detecting and reacting to security events?
correlation
Which term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs?
false positive
Which network technology uses a passive splitting device that forwards all traffic, including Layer 1 errors, to an analysis device?
network tap
A DNS ______ attack is used to build botnets to bypass traditional security solutions
tunnel