Questions

In Cisco exams, you are not permitted to go back and review or change previous answers.
Questions in the exam increase in complexity and difficulty, and later questions may assist you with earlier ones. Test yourself under Cisco exam conditions as you get more confident!
  1. Which metric relates to "the context by which vulnerability exploitation is possible"?
    1. Attack Vector
    2. Attack Complexity
    3. Attack Pathway
    4. Attack Vulnerability
  2. Which metric relates to "conditions beyond the attacker's control that are required in order to successfully exploit a vulnerability"?
    1. Privileges Required
    2. Attack Complexity
    3. Attack Prerequisites
    4. Attack Vector
  3. An attacker is able to place a call and listen to a victim's microphone without the victim accepting the call. Which CVSS 3.0 metric will rate the highest?
    1. Availability
    2. Confidentiality
    3. Integrity
    4. Scope
  1. An attacker is able to change the contents of a file on a networked computer. Which metric will rate the highest?
    1. Availability
    2. Integrity
    3. Attack Vector
    4. Attack Complexity
  2. Which of the following is an example of an attack whose scope has been potentially changed?
    1. A denial-of-service attack
    2. An attack against a web server which compromises web browsers which connect to it
    3. An attacker editing the contents of a file on a networked computer
    4. A script in an Excel file which modifies a file in the user's documents
  3. Which CVSS impact scores might represent a threat against a gaming server which leaves it completely offline?
    1. CVSS:3.0/{Portion Removed}/C:H/I:L/A:N
    2. CVSS:3.0/{Portion Removed}/C:H/I:L/A:N
    3. CVSS:3.0/{Portion Removed}/C:N/I:N/A:H
    4. CVSS:3.0/{Portion Removed}/C:N/I:N/A:N
  4. Which CVSS exploitability scores might represent an exploit which requires an attacker to construct a URL to a vulnerable phpMyAdmin web server that injects malicious code? The URL must be clicked for the malicious code to execute in the victim's web browser. This code is limited to the website running the vulnerable phpMyAdmin software:
    1. CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
    2. CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
    3. CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
    4. CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

The following screenshot refers to an item that's been uploaded to AMP Threat Grid. The following three questions are related to this screenshot:

Screenshot from AMP Threat Grid
  1. What type of file was uploaded?
    1. An image file
    2. A portable executable file
    3. A portable document file
    4. A compressed (archive) file
  2. What actions should a tier 1 analyst take?
    1. Immediately quarantine and block access to the file
    2. Refer the report to a tier 2 analyst
    3. Remove the file from quarantine
    4. Log a report about a suspicious file with a tier 3 analyst
  3. What kind of malware has been detected?
    1. Virus
    2. Worm
    3. Ransomware
    4. Spyware
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.105.181