Agentless and agent-based protection for security are used.
B.
Several distinct protective layers are involved.
C.
Access control models are involved.
D.
Authentication, authorization, and accounting mechanisms are used.
Answer:
B
Explanation:
Explanation:
Defense-in-depth is a security strategy where multiple layers of defense are placed throughout an information technology (IT) system. It addresses physical, technical, and administrative controls to provide redundancy and ensure that if one layer fails, others will be in place to thwart an attack. References: Cisco Tech Roles - CyberOps Engineer
Question 25
At which layer is deep packet inspection investigated on a firewall?
Options:
A.
internet
B.
transport
C.
application
D.
data link
Answer:
C
Explanation:
Explanation:
Deep packet inspection (DPI) is a sophisticated method of examining the content of data packets as they pass through a network checkpoint, including both the header and the data payload. DPI is typically performed at the application layer of the Open Systems Interconnection (OSI) model. This allows the inspection process to evaluate the actual content of the packets, not just the header information, enabling the identification of various types of threats and the enforcement of network policies1.
References := The explanation aligns with the information provided by Digital Guardian, which details how DPI works and at which layer it is applied1.
Question 26
Refer to the exhibit.
Which type of log is displayed?
Options:
A.
IDS
B.
proxy
C.
NetFlow
D.
sys
Answer:
D
Explanation:
Explanation:
The exhibit displays a sys log which is used in computer systems for messaging logs. It provides messaging tracking services from different devices like routers, switches etc., which helps in tracking and identifying potential issues. References := Cisco Cybersecurity source documents or study guide
Question 27
What is a scareware attack?
Options:
A.
using the spoofed email addresses to trick people into providing login credentials
B.
overwhelming a targeted website with fake traffic
C.
gaming access to your computer and encrypting data stored on it
D.
inserting malicious code that causes popup windows with flashing colors
Answer:
D
Explanation:
Explanation:
Scareware is a type of malware attack that tricks users into believing their computer is infected with a virus, prompting them to download and pay for fake antivirus software. The attack often uses popup windows with flashing colors (D) to create a sense of urgency and scare the user into taking immediate action.