Cisco Cyber Ops Chapter 7 Quiz

Ace your homework & exams now with Quizwiz!

In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?

DoS

What technique is a security attack that depletes the pool of IP addresses available for legitimate hosts?

DHCP starvation

Which network monitoring technology collects IP operational data on packets flowing through Cisco routers and multilayer switches?

NetFlow

Which monitoring technology mirrors traffic flowing through a switch to an analysis device connected to another switch port?

SPAN

Which language is used to query a relational database?

SQL

Which technology is a proprietary SIEM system?

Splunk

Which network monitoring tool is in the category of network protocol analyzers?

Wireshark

Which network monitoring tool saves captured network frames in PCAP files?

Wireshark

Which SIEM function is associated with examining the logs and events of multiple systems to reduce the amount of time of detecting and reacting to security events?

correlation

Which term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs?

false positive

Which network technology uses a passive splitting device that forwards all traffic, including Layer 1 errors, to an analysis device?

network tap

A DNS ______ attack is used to build botnets to bypass traditional security solutions

tunnel


Related study sets

Chapter 9 - Data Warehousing and Data Integration

View Set

Office Applications I Unit 1 Quiz 1

View Set

List #2: North America/U.S. Geography Basics

View Set

Aggregate Demand and Aggregate Supply

View Set

Chapter 10: Security in Network Design

View Set