Chapter 17: Mock Exam 1
- A rogue device has been detected on a network. Which of the following can be used to help determine the type or vendor of the device?
A. IP address
B. Service port number
C. MAC address
D. All of the above
- A security professional suspects that the ARP cache of a host system was compromised. Which of the following commands can be used to show the ARP entries?
A. arp -a
B. ipconfig
C. ifconfig
D. netstat -ano
- An attacker was able to perform a man-in-the-middle attack and retrieved a victim's user credentials. Which of the following protocols was the victim most likely using?
A. S/MIME
B. HTTPS
C. SMTP
D. FTPS
- An attacker was able to redirect users to a malware-infected web server whenever they visited the URL http://www.server.local ...
Get Cisco Certified CyberOps Associate 200-201 Certification Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.