Which ICMP message type should be stopped inbound?
Echo
The echo ICMP packet should not be allowed inbound on an interface. The echo-reply should be allowed so that when an internal device pings an external device, the reply is allowed to return.
How can IMAP be a security threat to a company?
An email can be used to bring malware to a host.
Which two technologies are primarily used on peer-to-peer networks? (Choose two.)
Bitcoin
BitTorrent
Which protocol is exploited by cybercriminals who create malicious iFrames?
HTTP
Which method is used by some malware to transfer files from infected hosts to a threat actor host?
ICMP tunneling
Why does HTTPS technology add complexity to network security monitoring?
HTTPS conceals data traffic through end-to-end encryption.
Which approach is intended to prevent exploits that target syslog?
Use syslog-ng
Which type of attack is carried out by threat actors against a network to determine which IP addresses, protocols, and ports are allowed by ACLs?
reconnaissance
Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.)
HTTP
HTTPS
What is Tor?
a software platform and network of P2P hosts that function as Internet routers
Which protocol is a name resolution protocol often used by malware to communicate with command-and-control (CnC) servers?
DNS
Which technique is necessary to ensure a private transfer of data using a VPN?
encryption
Which technology would be used to create the server logs generated by network devices and reviewed by an entry level network person who works the night shift at a data center?
syslog
Which two tools have a GUI interface and can be used to view and analyze full packet captures? (Choose two.)
Wireshark
Cisco Prime Network Analysis Module
Which statement describes statistical data in network security monitoring processes?
It is created through an analysis of other forms of network data.
Which Windows log contains information about installations of software, including Windows updates?
setup logs
Which function is provided by the Sguil application?
It makes Snort-generated alerts readable and searchable.
Which statement describes a Cisco Web Security Appliance (WSA)?
It functions as a web proxy.
Which Cisco appliance can be used to filter network traffic contents to report and deny traffic based on the web server reputation?
WSA
What does it indicate if the timestamp in the HEADER section of a syslog message is preceded by a period or asterisk symbol?
There is a problem associated with NTP
Which information can be provided by the Cisco NetFlow utility?
peak usage times and traffic routing
How does a web proxy device provide data loss prevention (DLP) for an enterprise?
by scanning and logging outgoing traffic
A system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do?
Delete the file because it is probably malware
Which technique would a threat actor use to disguise traces of an ongoing exploit?
Corrupt time information by attacking the NTP infrastructure