Chapter 2 Cisco quiz
Which two characteristics describe a worm? (Choose two)
1. is self-replicating 2.travels to new computers without any intervention or knowledge of the user
Which example illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
Which tool is used to provide a list of open ports on network devices
Nmap
In what way are zombies used in security attacks?
They are infected machines that carry out a DDoS attack
Which type of attack allows an attacker to use a brute force approach?
password cracking
What is the purpose of a rootkit?
to gain privileged access to a device while concealing itself
What is the most common goal of search engine optimization (SEO) poisoning?
to increase web traffic to malicious sites
What is the primary goal of a DoS attack?
to prevent the target server from being able to handle additional requests