Cisco® 210-255 Exam Practice Questions (P. 3)
- Full Access (179 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?
send
light_mode
delete
Question #12
Which regular expression matches "color" and "colour"?
- Acol[0-9]+our
- Bcolo?ur
- Ccolou?r
- D[a-z]{7}
Correct Answer:
C
Reference:
http://www.regular-expressions.info/quickstart.html
C
Reference:
http://www.regular-expressions.info/quickstart.html
send
light_mode
delete
Question #13
In VERIS, an incident is viewed as a series of events that adversely affects the information assets of an organization. Which option contains the elements that every event is comprised of according to VERIS incident model?
- Avictim demographics, incident description, incident details, discovery & response
- Bvictim demographics, incident details, indicators of compromise, impact assessment
- Cactors, attributes, impact, remediation
- Dactors, actions, assets, attributes
Correct Answer:
D
Reference:
https://github.com/vz-risk/veris/wiki/VERIS-Overview
D
Reference:
https://github.com/vz-risk/veris/wiki/VERIS-Overview
send
light_mode
delete
Question #14
Which statement about threat actors is true?
- AThey are any company assets that are threatened.
- BThey are any assets that are threatened.
- CThey are perpetrators of attacks.
- DThey are victims of attacks.
Correct Answer:
C
C
send
light_mode
delete
Question #15
Which Security Operations Center's goal is to provide incident handling to a country?
- ACoordination Center
- BInternal CSIRT
- CNational CSIRT
- DAnalysis Center
Correct Answer:
C
Some general categories of CSIRTs include, but are not limited to, the following:
✑ Internal CSIRTs provide incident handling services to their parent organization. This could be a CSIRT for a bank, a manufacturing company, a university, or a federal agency.
✑ National CSIRTs provide incident handling services to a country. Examples include: the Japan CERT Coordination Center (JPCERT/CC) or the Singapore
Computer Emergency Response Team (SingCERT).
✑ Coordination Centers coordinate and facilitate the handling of incidents across various CSIRTs. Examples include the CERT Coordination Center or the United
States Computer Emergency Readiness Team (US-CERT).
✑ Analysis Centers focus on synthesizing data from various sources to determine trends and patterns in incident activity. This information can be used to help predict future activity or to provide early warning when the activity matches a set of previously determined characteristics.
✑ Vendor Teams handle reports of vulnerabilities in their software or hardware products. They may work within the organization to determine if their products are vulnerable and to develop remediation and mitigation strategies. A vendor team may also be the internal CSIRT for a vendor organization.
✑ Incident Response Providers offer incident handling services as a for-fee service to other organizations.
Reference:
http://www.cert.org/incident-management/csirt-development/csirt-faq.cfm?
C
Some general categories of CSIRTs include, but are not limited to, the following:
✑ Internal CSIRTs provide incident handling services to their parent organization. This could be a CSIRT for a bank, a manufacturing company, a university, or a federal agency.
✑ National CSIRTs provide incident handling services to a country. Examples include: the Japan CERT Coordination Center (JPCERT/CC) or the Singapore
Computer Emergency Response Team (SingCERT).
✑ Coordination Centers coordinate and facilitate the handling of incidents across various CSIRTs. Examples include the CERT Coordination Center or the United
States Computer Emergency Readiness Team (US-CERT).
✑ Analysis Centers focus on synthesizing data from various sources to determine trends and patterns in incident activity. This information can be used to help predict future activity or to provide early warning when the activity matches a set of previously determined characteristics.
✑ Vendor Teams handle reports of vulnerabilities in their software or hardware products. They may work within the organization to determine if their products are vulnerable and to develop remediation and mitigation strategies. A vendor team may also be the internal CSIRT for a vendor organization.
✑ Incident Response Providers offer incident handling services as a for-fee service to other organizations.
Reference:
http://www.cert.org/incident-management/csirt-development/csirt-faq.cfm?
send
light_mode
delete
All Pages