Updated- Cisco CyberOps Associate |CCNA|
FINAL EXAM REVIEW *Q&A* (100%
Correct) 2025/2026 |VERIFIED|
Which term refers to a weakness in a system that could potentially compromise its security?
A. Threat
B. Vulnerability
C. Exploit
D. Risk
By analyzing logs of a stateful...
Updated- Cisco CyberOps Associate |CCNA|
FINAL EXAM REVIEW *Q&A* (100%
Correct) 2025/2026 |VERIFIED|
Which term refers to a weakness in a system that could potentially compromise its security?
A. Threat
B. Vulnerability
C. Exploit
D. Risk
By analyzing logs of a stateful firewall, which two tasks can be performed? (Choose two)
A. Audit user behavior on social media platforms.
B. Identify internal IP addresses mapped to external public IP addresses.
C. Verify the sequence of network connections based on the TCP 5-tuple.
D. Track the transmission of malware via an SMTP connection.
E. Determine user IDs involved in an instant messaging exchange.
Which access control model limits or allows access based on the security policy set by the object's
owner?
A. Discretionary access control
B. Mandatory access control
C. Role-based access control
D. Rule-based access control
What type of data is typically associated with logs from an application server?
A. Transaction data
B. Statistical data
C. Session data
1
,D. Alert data
Which of the following is an example of social engineering?
A. Receiving an email claiming to be from HR, asking you to verify your personal information via a link.
B. Receiving a calendar invitation for a routine meeting.
C. Asking an administrator verbally to change a password for an account.
D. Receiving a phone call from the IT department requesting your username and password.
What characterizes the Zero Trust model?
A. It automatically blocks all unknown devices from accessing the network.
B. It requires all devices and users to authenticate before accessing the network.
C. It provides encrypted connections between devices on a private network.
D. It blocks access based on a device’s geographic location.
Which activity is not typically associated with a Security Information and Event Management (SIEM)
system?
A. Log auditing and incident response
B. Service privilege monitoring
C. Total traffic encryption
D. Continuous monitoring
Which principle ensures that users are only granted the permissions necessary for their tasks?
A. Principle of least privilege
B. Principle of role-based access
C. Principle of mandatory access control
D. Principle of user transparency
What is the definition of threat actors in cybersecurity?
2
, A. A tool that helps break into systems and steal data
B. Individuals or groups attempting to cause harm to organizations, intentionally or unintentionally
C. An automatic system designed to protect against malicious attacks
D. Security professionals hired to test system vulnerabilities
What does Run Book Automation (RBA) refer to?
A. Technology that automates IT operational tasks
B. A tool for encrypting network communications
C. A security device that detects system anomalies
D. A guide for handling day-to-day IT issues
Which platform helps collect and analyze data to inform security response actions?
A. Threat Intelligence Platform (TIP)
B. Security Operations and Automated Response System (SOAR)
C. Run Book Automation (RBA)
D. Security Information Event Manager (SIEM)
What is the purpose of SOAR in cybersecurity?
A. To assist in streamlining network operations
B. To collect security data from different sources and automate incident responses
C. To analyze malware trends and predict attacks
D. To monitor user activity and provide remote troubleshooting
Which term refers to the use of a known weakness in a system to exploit it?
A. Vulnerability
B. Threat
C. Exploit
D. Risk
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller StellarGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.54. You're not tied to anything after your purchase.