Cisco CyberOps Competency (Intermediate Level)

  • 45m
  • 30 questions
The Cisco CyberOps Competency benchmark will measure your ability to recognize key terms and concepts related to key Cisco CyberOps concepts. You will be evaluated on common vulnerabilities, access control models, NetFlow and tcpdump, and network attacks. A learner who scores high on this benchmark demonstrates that they have the skills related to Cisco CyberOps threat detection.

Topics covered

  • classify network traffic types that indicate potential data loss
  • describe differences between different access control models
  • describe different types of data loss and concerns regarding data loss
  • describe the tools used to implement different cybersecurity approaches
  • differentiate between characteristics of different detection methods
  • explain different strategies used for risk reduction
  • identify Cisco content filtering products
  • identify data visibility challenges on firewalls that involve hiding the source of a packet
  • identify different sources of cybersecurity threats
  • identify log related security implementation methods and their benefits
  • identify methods to overcome visibility challenges
  • identify packet headers used by firewalls to control traffic
  • identify security terminology related to attack surfaces, vulnerabilities, and analysis tools
  • identify techniques hackers use for evading detection
  • identify the commands to configure NetFlow on a Cisco device
  • identify the components of AAA services
  • identify the components of the 5-tuple approach to isolating a particular host
  • identify the different types of social engineer attacks involving email messages or text messages
  • identify the importance of various aspects of the CIA triad
  • identify the needs of administrators regarding data visibility
  • identify the ports opened on firewalls for different types of traffic
  • identify the standard for digital certificates
  • identify the type of data that is an exact copy of network traffic
  • identify the types of DDoS attacks
  • identify types of packet analysis performed by firewalls
  • recognize examples of risks, threats, vulnerabilities, and exploits
  • recognize the advantages of using CVSS to understand system attacks
  • recognize the attack type that involves the hacker injecting database syntax into the web application
  • recognize the security terminology and practices within the SOC
  • recognize the type of attack that involves multiple systems being used to overload a victim