Certbus > Cisco > Cisco Certifications > 210-255 > 210-255 Online Practice Questions and Answers

210-255 Online Practice Questions and Answers

Questions 4

Which regular expression matches "color" and "colour"?

A. col[0-9]+our

B. colo?ur

C. colou?r

D. ]a-z]{7}

Browse 224 Q&As
Questions 5

What information from HTTP logs can be used to find a threat actor?

A. referer

B. IP address

C. user-agent

D. URL

Browse 224 Q&As
Questions 6

You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)

A. file size

B. domain names

C. dropped files

D. signatures

E. host IP addresses

Browse 224 Q&As
Questions 7

At which stage attacking the vulnerability belongs in Cyber kill chain?

A. Exploitation

B. Reconnaissance

C. Weaponization

D. Delivery

E. Installation

F. Command and control (C2)

G. Actions on objectives

Browse 224 Q&As
Questions 8

Which two potions about deterministic and probabilistic analysis are true? (Choose two.)

A. probabilistic analysis uses data known beforehand and deterministic analysis is based off assumptions.

B. Deterministic analysis uses data known beforehand and probabilistic analysis based off of assumptions.

C. Deterministic analysis is based off of assumptions

D. Probabilistic analysis result in a result that is definitive.

E. probabilistic analysis results in a result that is not definitive.

Browse 224 Q&As
Questions 9

Refer to exhibit. Which option is the logical source device for these events?

A. web server

B. NetFlow collector

C. proxy server

D. IDS/IPS

Browse 224 Q&As
Questions 10

Employees are allowed access to internal websites. An employee connects to an internal website and IDS reports it as malicious behavior. What is this example of?

A. true positive

B. false negative

C. false positive

D. true negative

Browse 224 Q&As
Questions 11

What define the roadmap for implementing the incident response plan?

A. Incident response plan

B. Incident response policy

C. Incident response procedures

Browse 224 Q&As
Questions 12

Which example of a precursor is true?

A. A notification that a host is infected with malware.

B. An admin finds their password has been changed.

C. A log indicating a port scan was run against a host

D. A device configuration changed from the baseline without an audit log entry.

Browse 224 Q&As
Questions 13

Which two statements correctly describe the victim demographics section of the VERIS schema? (Choose two.)

A. The victim demographics section describes but does not identify the organization that is affected by the incident.

B. The victim demographics section compares different types of organizations or departments within a single organization.

C. The victim demographics section captures general information about the incident.

D. The victim demographics section uses geolocation data to identify the organization name of the victim and the threat actor.

Browse 224 Q&As
Questions 14

Which netstat command show ports? (Choose two)

A. netstat a

B. netstat -l

C. netstat -v

D. netstat -g

Browse 224 Q&As
Questions 15

Which incident handling phase contains evidence gathering and handling?

A. containment, eradication, and recovery

B. identification

C. post incident

D. preparation

Browse 224 Q&As
Questions 16

Which filter shows only SMTP and ICMP traffic on Wireshark?

A. tcp.eq 25 or icmp

B. tcp.port eq 25 or icmp

C. port eq 25 and icmp

D. tcp.port eq 25 also icmp

Browse 224 Q&As
Questions 17

Refer to the exhibit. Which event is represented by this configuration?

A. The ext3-test.img is being converted from read-only to read-write for analysis.

B. A drive is being mounted using ext3-test.img file as a source.

C. A /mnt/test directory is being created in the ext3-test.img file.

D. The ext3-test.img file was found on the ext4 filesystem in the /mnt/test directory.

Browse 224 Q&As
Questions 18

Which command filters a port?

A. tcp.port equals 25

B. tcp.port is 25

C. tcp.port != 25

D. !tcp.port==25

Browse 224 Q&As
Exam Code: 210-255
Exam Name: Cisco Cybersecurity Operations
Last Update: Nov 03, 2022
Questions: 224 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99