Ccna security assessment 1
What is the significant characteristic of worm malware?
A worm can execute independently
What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?
Financial gain
What causes a buffer overflow?
Attempting to write more data to a memory location than that location can hold
Which two statements describe access attacks? (Choose two.)
Buffer overflow attacks write data beyond the hallocated buffer memory to overwrite valid data or to exploit systems to execute malicious code. Password attacks can be implemented by the use os brute-force attack methods, Trojan horse, or packet sniffers.
What is a characteristic of a Trojan horse as it relates to network security?
Malware is contained in a seemingly legitimate executable program.
How is a smurf attack conducted?
By sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network
An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?
Man in the middle
What is the first step in the risk management process specified by the ISO/IEC?
Conduct a risk assessment
What are the three components of information security ensured by cryptography? (Choose three.)
Confidentiality Integrity Availability
What functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?
Control plane
Which two statements characterize DoS attacks? (Choose two.)
Examples include smurf attacks and ping of death attacks. They attempt to compromise the availability of a network, host, or application.
What role does the Security Intelligence Operations (SIO) play in the Cisco SecureX architecture?
Identifying and stopping malicious traffic
What is the primary method for mitigating malware?
Installing antivirus on hosts
Which statement accurately characterizes the evolution of threats to network security?
Internal threats can cause even greater damage than external threats
Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)
Intrusion detection Anti spoofing
A disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?
Recon
What are the three core components of the Cisco Secure Data Center solution? (Choose three.
Secure segmentation visibility threat defense
What is an objective of a state-sponsored attack?
To right a perceived wrong
What worm mitigation phase involves actively disinfecting infected systems?
Treatment
What is a ping sweep?
a network scanning technique that indicates the live hosts in a range of IP addresses
What are the three major components of a worm attack? (Choose three.)
a payload* an enabling vulnerability* a propagation mechanism
What method can be used to mitigate ping sweeps?
blocking ICMP echo and echo-replies at the network edge
Which condition describes the potential threat created by Instant On in a data center?
when a VM that may have outdated security policies is brought online after a long period of inactivity.