Which process represents the application-level allow list?
Options:
A.
allowing everything and denying specific applications protocols
B.
allowing everything and denying specific executable files
C.
allowing specific format files and deny executable files
D.
allowing specific files and deny everything else
Answer:
D
Explanation:
Explanation:
Application-level allow list refers to the practice of specifying an index of approved applications that are permitted to be executed in a system environment or network, which means only specific files are allowed while everything else is denied by default, enhancing security.
Question 21
What is the difference between an attack vector and attack surface?
Options:
A.
An attack surface identifies vulnerabilities that require user input or validation; and an attack vector identifies vulnerabilities that are independent of user actions.
B.
An attack vector identifies components that can be exploited, and an attack surface identifies the potential path an attack can take to penetrate the network.
C.
An attack surface recognizes which network parts are vulnerable to an attack; and an attack vector identifies which attacks are possible with these vulnerabilities.
D.
An attack vector identifies the potential outcomes of an attack; and an attack surface launches an attack using several methods against the identified vulnerabilities.
Answer:
B
Explanation:
Explanation:
An attack vector is the method or technique that an attacker uses to exploit a vulnerability in a system or network. An attack vector can be a software, hardware, or human component that can be manipulated to gain unauthorized access, execute malicious code, or cause damage. An attack surface is the sum of all the possible attack vectors that are exposed by a system or network. An attack surface can be reduced by applying security measures such as patching, hardening, firewalling, and encrypting. References: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 1-4; 200-201 CBROPS - Cisco, exam topic 1.1.c
Question 22
Which technology prevents end-device to end-device IP traceability?
Options:
A.
encryption
B.
load balancing
C.
NAT/PAT
D.
tunneling
Answer:
C
Explanation:
Explanation:
NAT (Network Address Translation) and PAT (Port Address Translation) are technologies that modify the IP address information in packet headers as they pass through a router or firewall, making it difficult to trace the communication back to the originating end-device.
Question 23
Which statement describes indicators of attack?
Options:
A.
internal hosts communicate with countries outside of the business range.
B.
Phishing attempts on an organization are blocked by mall AV.
C.
Critical patches are missing.
D.
A malicious file is detected by the AV software.
Answer:
A
Explanation:
Explanation:
Indicators of Attack (IoA) refer to observable behaviors or artifacts that suggest a security breach or ongoing attack.
When internal hosts communicate with countries outside the business range, it may indicate data exfiltration or command-and-control communication to an external threat actor.
Unlike Indicators of Compromise (IoC) which indicate that a system has already been compromised, IoAs are often used to identify malicious activity in its early stages.
Monitoring for unusual outbound connections is a crucial aspect of detecting advanced persistent threats (APTs) and other sophisticated attacks.
References
Difference Between Indicators of Compromise and Indicators of Attack