cisco chapter 16 final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?

DoS attack

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

Which component is designed to protect against unauthorized communications to and from a computer?

firewall

Which device controls traffic between two or more networks to help prevent unauthorized access?

firewall

What is one of the most effective security tools available for protecting users from external threats?

firewalls

Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?

recconnaissance attack

What type of attack may involve the use of tools such as nslookup and fping?

recconnaissance attack

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

remote access to a switch where data is encrypted during the session

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

routerA(config)#login block-for 30 attempts 2 within 10

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?

security

Which device is used by other network devices to authenticate and authorize management access?

AAA server

This zone is used to house servers that should be accessible to outside users.

DMZ

Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario?

DOS attack

Which type of network threat is intended to prevent authorized users from accessing resources?

Dos attacks

What is the purpose of the network security accounting function?

to keep track of the actions of the user

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?

access attack

Which type of network threat is intended to prevent authorized users from accessing resources?

accounting, authorization, and authentication

Which is appropriate for providing endpoint security?

antivirus software

What kind of threat is described when a threat actor alters data records?

data loss or manipulation

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss or manipulation

What is the objective of a network reconnaissance attack?

discovery and mapping of systems

What kind of threat is described when a threat actor overloads a network to deny other users network access?

disruption of service

What kind of threat is described when a threat actor prevents legal users from accessing data services?

disruption of services

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?

environmental

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

firewall settings

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

identity theft

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

identity theft

What kind of threat is described when a threat actor is stealing the user database of a company?

information theft

What kind of threat is described when a threat actor steals scientific research data?

information theft

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?

malware attack

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?

malware attack

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

user account, ip domain name, and unique hostname

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

worm


Ensembles d'études connexes

Теорія держави і права екзамен

View Set

A&P 1: Chapters 12 & 13 Practice Action Potential with animations and questions

View Set

P1_L1-Chapter1- Security Mindset

View Set

Series 66 Uniform Securities Act Quiz #1

View Set

Nutrition and Addiction EAQ questions

View Set

Business Law Ch.6: Tort Law & Cybertorts

View Set