Vulnerability refers to a weakness or flaw in a system that can be exploited by threats. Risk, on the other hand, is the potential for loss or damage when a threat exploits a vulnerability. The risk is essentially the impact or consequence of a vulnerability being exploited
Question # 18
Refer to the exhibit.
Which component is identifiable in this exhibit?
A.
Trusted Root Certificate store on the local machine
The exhibit shows “HKEY_LOCAL_MACHINE,†which is a Windows Registry hive. The registry is a database used to store low-level settings for the operating system and for applications that opt to use the registry. The other options are not related to the exhibit, as they are either a part of the Windows Certificate Manager, a naming convention for Windows PowerShell commands, or a component of the Windows Services Manager. References := Cisco Cybersecurity
NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network flow. It provides valuable data about the network sessions occurring within the network, such as source and destination IP addresses, port numbers, and protocols used. This session data is useful for understanding traffic patterns, volume, and usage.
References: Cisco’s training and certification materials on NetFlow would discuss how it is used to obtain session data for network analysis.
Question # 20
Drag and drop the elements from the left into the correct order for incident handling on the right.
An incident response plan is a document that defines the roles and responsibilities, procedures, and processes for detecting, analyzing, containing, eradicating, recovering, and learning from security incidents. The purpose of an incident response plan is to minimize the impact of incidents on the organization’s assets, operations, and reputation, and to restore normal operations as quickly as possible. An incident response plan is not the same as a security management plan, a disaster recovery plan, or a backup and archiving plan, although they may be related or complementary. References := Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 92; NIST SP 800-61 Rev. 2, Computer Security Incident Handling Guide, page 2-3
Question # 22
What is a purpose of a vulnerability management framework?
A.
identifies, removes, and mitigates system vulnerabilities
B.
detects and removes vulnerabilities in source code
A vulnerability management framework is a set of processes and tools that helps an organization identify, assess, prioritize, remediate, and mitigate system vulnerabilities. A vulnerability management framework aims to reduce the attack surface and the risk of compromise by applying security patches, hardening configurations, implementing security controls, and monitoring the system status. A vulnerability management framework is an essential component of a security operations center (SOC). References: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 2-14; 200-201 CBROPS - Cisco, exam topic 1.2.b
Question # 23
What is the difference between the ACK flag and the RST flag in the NetFlow log session?
A.
The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the data for the payload is complete
B.
The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete
C.
The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection
D.
The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection
 In NetFlow log sessions within TCP connections; ACK flag is used for acknowledging that data has been successfully received while RST flag is used when there’s an error or when closing a connection spontaneously without following standard procedures. References := Cisco Cybersecurity source documents or study guide
Question # 24
Which two elements are used for profiling a network? (Choose two.)
 Profiling a network involves various elements that provide insights into its characteristics and behaviors. Total throughput is crucial as it measures the amount of data passing from a source to a destination in a given period, reflecting the network’s capacity and usage patterns1. Listening ports are also essential for profiling because they represent the entry points for network services, indicating which services are available and potentially vulnerable1.
References :=
Network profiling tools and techniques discussed in online resources23.