Q: 11
What ate two categories of DDoS attacks? (Choose two.)
Options
Discussion
D or E. I remember "reflected" and "direct" from my studies, but scanning sounds almost right for attacks in general. Not totally sure since some practice questions mention scanning too.
Option B but D also makes sense. Anyone else pick B for scanning?
Its D and E, kinda confused but think that's what my notes say. Can someone confirm?
Be respectful. No spam.
Q: 12
An automotive company provides new types of engines and special brakes for rally sports cars. The
company has a database of inventions and patents for their engines and technical information
Customers can access the database through the company's website after they register and identify
themselves. Which type of protected data is accessed by customers?
Options
Discussion
Option A
Yeah, it's A here since patents and inventions are classic intellectual property. None of the other options really fit that context. Pretty confident about this, but let me know if you see it differently.
Not totally sure but pretty sure it's A. Anyone else think so?
Be respectful. No spam.
Q: 13
How is attacking a vulnerability categorized?
Options
Discussion
Option C makes sense since exploitation is literally when the attacker takes advantage of a vulnerability. The other phases are about delivery, persistence or objectives, not the actual attack step. I think that's spot on but I'm open if anyone disagrees.
C here since exploitation is when someone actually attacks a weakness. Delivery and installation are different steps, not about hitting the vuln directly. Pretty confident but willing to hear counterpoints.
Pretty sure C here since exploitation is all about using vulnerabilities. The other phases come before or after this step in the attack lifecycle. Makes sense with what I've seen on Cisco practice too, but open to other takes.
B not A. Exploitation (C) is when attackers actually use a vuln, saw something similar in exam reports.
C matches the exploitation phase. No doubt on this one.
C That's the exploitation phase in the attack lifecycle. Pretty sure that's what Cisco expects here.
Be respectful. No spam.
Q: 14
Which attack method intercepts traffic on a switched network?
Options
Discussion
Probably B. ARP cache poisoning lets an attacker reroute or sniff packets on a switched network by tricking the switch’s ARP tables. Other options don’t really intercept traffic at layer 2 like this. Pretty sure that’s what they’re asking, but open to other takes.
Its C, seen something like this in some practice tests and think official guide touches on it too.
Is this covered in the official cert guide or better shown in labs? I've seen similar questions in practice exams lately.
Nah, not C. Pretty sure it's B since DHCP snooping is more a defense, ARP poisoning is the traffic interceptor.
B tbh
C I've seen a similar question in exam reports.
Be respectful. No spam.
Q: 15
According to CVSS, what is a description of the attack vector score?
Options
Discussion
Option C fits what I've seen in the official guide. Attack vector in CVSS gives a higher score if the exploit can be done remotely, making it more severe. If you want more examples, check labs or practice questions.
Call it D, had something like this in a mock and D seemed right there.
So tired of CVSS wording tricks, but C tbh
Why is D tempting here? Isn't the attacker's distance already covered under the "remote" criteria CVSS uses for attack vector?
CVSS makes the attack vector score higher when a vulnerability can be exploited remotely. So C fits with what I remember from similar exam questions, but if I'm off let me know.
C tbh. D trips up a lot of folks, but CVSS scores do spike for remote attacks, not just physical proximity.
Be respectful. No spam.
Q: 16
What is data encapsulation?
Options
Discussion
B , this is basic from the official guide and also in Cisco's exam practice.
C tbh
D imo, unless the keyword is specifically about OSI or protocol headers, then B could be right.
Be respectful. No spam.
Q: 17
What is a benefit of agent-based protection when compared to agentless protection?
Options
Discussion
C makes sense here. Agent-based runs locally so it can see all device traffic, pretty sure that’s the key point.
C tbh, clear question and good focus on endpoint local detection advantage.
Be respectful. No spam.
Q: 18
An engineer must configure network systems to detect command-and-control communications by
decrypting ingress and egress perimeter traffic and allowing network security devices to detect
malicious outbound communications. Which technology must be used to accomplish this task?
Options
Discussion
C tbh. Digital certificates let devices decrypt and inspect SSL/TLS traffic for threats, which is what the question wants. Not totally confident, but that's usually how C2 detection works at the perimeter.
Not B, C. Saw a similar question on a practice test and certificates are what let perimeter devices decrypt traffic for inspection.
C
Had something like this in a mock before, it's C. Digital certificates are needed for decryption on perimeter devices so they can scan the traffic. Pretty straightforward if you're familiar with SSL/TLS inspection. Let me know if anyone picked differently.
C
Official Cisco guides cover how digital certificates enable decryption for inspecting encrypted traffic. Practice labs are helpful to see how this lets network security devices catch command-and-control stuff. Pretty sure C is right, but open for discussion.
Official Cisco guides cover how digital certificates enable decryption for inspecting encrypted traffic. Practice labs are helpful to see how this lets network security devices catch command-and-control stuff. Pretty sure C is right, but open for discussion.
Be respectful. No spam.
Q: 19
What is the difference between a threat and a risk?
Options
Discussion
I don't think D is right, that's more about exposure. A matches what Cisco highlights as a threat definition in the docs.
A or D? Saw a similar question in exam reports, pretty sure it's A.
It’s A here. Had something like this in a mock and they focus on threats being the potential danger that could exploit a vulnerability, not the actual exposure or impact (risk covers that). Cisco always splits these two definitions up on their blueprints. Pretty confident but open to other takes if anyone interprets it differently.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2