🖥️ Host-Based Analysis & Endpoint Forensics - CYBEROPS Practice Questions

Study Windows and Linux endpoint forensics, file system analysis, registry examination, process and service investigation, malware indicators, and memory forensics techniques.

10Questions Available
1Exam Domains

Practice Host-Based Analysis Questions Now

Start a timed practice session focusing on Host-Based Analysis & Endpoint Forensics topics from the CYBEROPS question bank.

Start CYBEROPS Practice Quiz →

CYBEROPS Host-Based Analysis Question Bank (10 Questions)

Browse all 10 practice questions covering Host-Based Analysis & Endpoint Forensics for the CYBEROPS certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Host-Based Analysis

    What Linux command shows all currently running processes with their PIDs, user, and resource usage?

    Als -la
    Bps aux — displays all processes for all users with detailed information including PID, CPU%, memory%, and command
    Ccat /etc/passwd
    Difconfig
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    'ps aux': a=all users, u=user-oriented format, x=include processes without a terminal. Shows: USER, PID, %CPU, %MEM, VSZ, RSS, STAT, START, TIME, COMMAND. Also useful: 'top' (real-time), 'htop' (interactive), 'pstree' (parent-child hierarchy).

  2. Question 2Host-Based Analysis

    What Windows Registry key is commonly used by malware for persistence?

    AHKEY_LOCAL_MACHINE\HARDWARE
    BHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run — programs listed here automatically execute at every user logon
    CHKEY_CURRENT_CONFIG
    DHKLM\SYSTEM\Select
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Common persistence registry keys: HKLM\...\Run (all users), HKCU\...\Run (current user), RunOnce, Winlogon\Shell, Services, Scheduled Tasks. Malware adds entries to auto-start. Forensic check: compare against known-good baseline, use Autoruns (Sysinternals) to enumerate all auto-start locations.

  3. Question 3Host-Based Analysis

    What does the '/var/log/auth.log' (or /var/log/secure) file contain on Linux?

    AApplication errors only
    BAuthentication events: successful/failed logins, SSH connections, sudo usage, user account changes, and PAM module activities
    CKernel messages only
    DNetwork configuration
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    auth.log (Debian/Ubuntu) or secure (RHEL/CentOS): logs authentication events. Key entries: sshd sessions (accepted/failed), sudo commands, su attempts, account lockouts, PAM failures. Forensic goldmine: track unauthorized access, brute force attempts, privilege escalation.

  4. Question 4Host-Based Analysis

    What is the purpose of sandboxing in malware analysis?

    ATo encrypt malware samples for storage
    BTo execute suspicious files in an isolated environment for observation
    CTo block all network traffic from infected hosts
    DTo reverse-engineer malware source code
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Sandboxing runs suspicious files in an isolated virtual environment to observe behavior (file changes, network calls, registry modifications) without risking the production network.

  5. Question 5Host-Based Analysis

    How does sandbox analysis help identify malware behavior?

    AIt blocks malware from executing
    BIt executes suspicious files in an isolated virtual environment, monitoring file, registry, network, and process activity to reveal malicious behavior
    CIt encrypts malware samples
    DIt deletes all suspicious files
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Sandbox analysis: detonates suspicious files in a controlled VM, monitoring: files created/modified/deleted, registry changes, processes spawned, network connections (C2 callbacks), DLLs loaded, API calls, and screenshots. Reveals behavior that static analysis might miss. Tools: Cuckoo, Joe Sandbox, ANY.RUN.

  6. Question 6Host-Based Analysis

    Which Linux command displays running processes with resource usage?

    Als -la
    Btop
    Cifconfig
    Dchmod
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    The 'top' command displays real-time process information including CPU, memory usage, and process details. 'ps aux' provides a snapshot of all processes.

  7. Question 7Host-Based Analysis

    A Windows system has been compromised. Which tool would a security analyst use to examine running processes, network connections, and loaded DLLs?

    ANotepad
    BProcess Explorer (Sysinternals)
    CWindows Defender
    DBitLocker
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Process Explorer from the Sysinternals suite provides detailed information about running processes including loaded DLLs, handles, network connections, and parent-child relationships. It's a critical tool for incident response and malware analysis. Windows Defender is antivirus. BitLocker is disk encryption.

  8. Question 8Host-Based Analysis

    What is the purpose of a sandbox in malware analysis?

    ATo permanently quarantine infected files
    BTo execute suspicious code in an isolated environment and observe its behavior
    CTo block network traffic from known malicious IPs
    DTo encrypt sensitive data at rest
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    A sandbox is an isolated virtual environment where suspicious files or code can be safely executed and analyzed without risk to production systems. Analysts observe behavior such as file system changes, registry modifications, network connections, and process activity to determine if the sample is malicious.

  9. Question 9Host-Based Analysis

    Which Linux command displays active network connections, listening ports, and associated processes?

    Als -la
    Bnetstat -tulnp or ss -tulnp
    Cchmod 755
    Dgrep -r
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    'netstat -tulnp' (or the modern replacement 'ss -tulnp') shows TCP/UDP listening ports, established connections, and the process using each connection. This is essential for identifying unauthorized services or suspicious network activity during incident investigation. 'ls' lists files, 'chmod' changes permissions, 'grep' searches text.

  10. Question 10Host-Based Analysis

    On a Linux system, which file stores hashed user passwords?

    A/etc/passwd
    B/etc/shadow
    C/etc/hosts
    D/var/log/auth.log
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    /etc/shadow stores hashed passwords on Linux systems and is readable only by root. /etc/passwd contains user account information but typically an 'x' placeholder for the password field. /etc/hosts maps hostnames to IP addresses. /var/log/auth.log records authentication events.

Key Host-Based Analysis Concepts for CYBEROPS

forensicsendpointmalwarewindowslinuxregistryprocessfile systemhashsandbox

CYBEROPS Host-Based Analysis Exam Tips

Host-Based Analysis & Endpoint Forensics questions in CYBEROPS are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: forensics, endpoint, malware, windows, linux, registry.

What CYBEROPS Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Host-Based Analysis scenarios for CYBEROPS are frequently mapped to Domain 3 (20%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Host-Based Analysis interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Associate) and managed-service best practices.

High-Value Host-Based Analysis Concepts

  • Know the core Host-Based Analysis building blocks cold: forensics, endpoint, malware, windows.
  • Review the edge-case features and limits for linux, registry; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Host-Based Analysis pairs with Endpoint Security, Incident Response, Log Analysis in real deployment patterns.
  • For CYBEROPS, explain why the chosen Host-Based Analysis design meets reliability, security, and cost expectations better than the alternatives.

Common CYBEROPS Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in Host-Based Analysis often include distractors that look correct for Host-Based Analysis but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Host-Based Analysis implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to Host-Based Analysis (20%) outcomes for CYBEROPS?
  • Can you explain security and access boundaries for Host-Based Analysis without relying on default-open assumptions?
  • Can you describe how Host-Based Analysis integrates with Endpoint Security and Incident Response during failure, scaling, and monitoring events?

Exam Domains Covering Host-Based Analysis

Related Resources

More CYBEROPS Study Resources