CISCO Cyberops Security Fundamentals Section )

10 Questions

Settings
CISCO Quizzes & Trivia

The Cisco Cyber security Fundamentals quiz below aids those preparing for the first of two exams leading to that certification by helping understand cyber security basics, foundational networking and security knowledge and develop skills needed in preparation for the second (SECOPS) exam. Give it a try and see how reared you are. All the best!


Questions and Answers
  • 1. 
    Which one of the following commands should you use on a Windows system to examine all the IP to MAC address mappings of the neighboring devices that are on the same network?
    • A. 

      Ifconfig

    • B. 

      Ipconfig /all

    • C. 

      Netstat

    • D. 

      Arp -a

  • 2. 
    • A. 

      ICMP echo request and echo reply

    • B. 

      Source and destination IP addresses

    • C. 

      Source and destination MAC addresses

    • D. 

      Source and destination ports

    • E. 

      Default gateway MAC address

    • F. 

      Default gateway IP address

  • 3. 
    When data is sent from one host to another host, the sending host must package up the data. What is this packaging-up process called?
    • A. 

      Packaging

    • B. 

      Encapsulation

    • C. 

      Containerization

    • D. 

      Encoding

  • 4. 
    What is the maximum number of hosts that a network with a subnet mask of /26 can have?
    • A. 

      54

    • B. 

      56

    • C. 

      62

    • D. 

      64

  • 5. 
    • A. 

      There is no ARP entry for the default gateway.

    • B. 

      The DHCP server’s IP address configuration on the host’s network adapter is incorrect.

    • C. 

      The DNS is not working.

    • D. 

      All available IP addresses on the DHCP server are already leased out.

  • 6. 
    A lack of validation of the ARP replies can allow an attacker to successfully execute what type of attack?
    • A. 

      Man in the middle

    • B. 

      Rogue DHCP server

    • C. 

      DNS spoofing

    • D. 

      Replay

  • 7. 
    Which one of the following protocols is susceptible to a SYN flood attack?
    • A. 

      UDP

    • B. 

      ARP

    • C. 

      TCP

    • D. 

      ICMP

  • 8. 
    Which one of the following flags does a host set in the TCP segment to gracefully terminate a TCP connection?
    • A. 

      END

    • B. 

      STOP

    • C. 

      TERM

    • D. 

      FIN

  • 9. 
    Which one of the following protocols is used to automatically assign IP addresses and set TCP/IP stack configuration parameters?
    • A. 

      DNS

    • B. 

      TFTP

    • C. 

      DHCP

    • D. 

      RARP

  • 10. 
    Which one of the following tools should you use for packet capture and analysis?
    • A. 

      Ping

    • B. 

      Traceroute

    • C. 

      Netstat

    • D. 

      Nmap

    • E. 

      Tcpdump