O'Reilly logo

CCNA Cyber Ops SECOPS - Certification Guide 210-255 by Andrew Chu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mock Exam 2

  1. Which of the following are exploitability metrics?
    1. Attack Vector | Availability | Privileges Required
    2. Attack Vector | Attack Complexity | Privileges Required
    3. Confidentiality | Integrity | Availability
    4. Attack Complexity | User Interaction | Scope
  2. Which transport layer protocol is the most likely to be used for the destination: 192.168.1.254:snmp?
    1. DNS
    2. TCP
    3. HTTP
    4. UDP
  3. Which of the following will be matched by the regex statement, [PacktPub]{8}?
    1. packtpub
    2. Packt Pub
    3. PACKTPUB
    4. backtack
  4. What element of a network profile describes how much data is successfully transmitted over the network per second?
    1. Total throughput
    2. Session duration
    3. Critical asset utilization
    4. Running tasks
  1. Which of the following is a reason to conduct probabilistic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required