Ccna security assessment 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the significant characteristic of worm malware?

A worm can execute independently

What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

Financial gain

What causes a buffer overflow?

Attempting to write more data to a memory location than that location can hold

Which two statements describe access attacks? (Choose two.)

Buffer overflow attacks write data beyond the hallocated buffer memory to overwrite valid data or to exploit systems to execute malicious code. Password attacks can be implemented by the use os brute-force attack methods, Trojan horse, or packet sniffers.

What is a characteristic of a Trojan horse as it relates to network security?

Malware is contained in a seemingly legitimate executable program.

How is a smurf attack conducted?

By sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network

An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?

Man in the middle

What is the first step in the risk management process specified by the ISO/IEC?

Conduct a risk assessment

What are the three components of information security ensured by cryptography? (Choose three.)

Confidentiality Integrity Availability

What functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?

Control plane

Which two statements characterize DoS attacks? (Choose two.)

Examples include smurf attacks and ping of death attacks. They attempt to compromise the availability of a network, host, or application.

What role does the Security Intelligence Operations (SIO) play in the Cisco SecureX architecture?

Identifying and stopping malicious traffic

What is the primary method for mitigating malware?

Installing antivirus on hosts

Which statement accurately characterizes the evolution of threats to network security?

Internal threats can cause even greater damage than external threats

Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)

Intrusion detection Anti spoofing

A disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?

Recon

What are the three core components of the Cisco Secure Data Center solution? (Choose three.

Secure segmentation visibility threat defense

What is an objective of a state-sponsored attack?

To right a perceived wrong

What worm mitigation phase involves actively disinfecting infected systems?

Treatment

What is a ping sweep?

a network scanning technique that indicates the live hosts in a range of IP addresses

What are the three major components of a worm attack? (Choose three.)

a payload* an enabling vulnerability* a propagation mechanism

What method can be used to mitigate ping sweeps?

blocking ICMP echo and echo-replies at the network edge

Which condition describes the potential threat created by Instant On in a data center?

when a VM that may have outdated security policies is brought online after a long period of inactivity.


संबंधित स्टडी सेट्स

Salesforce Dev 401quiz cards (Verified Answers until 116 thx ikubota) Sept 2015

View Set

OWare- Essentials Of Communication 5. Presenting And Interpreting Public Messages

View Set

mastering bio ch 3: polarity of water

View Set

UNIT 2 Property Ownership and Interests

View Set

Web Authoring Software & Language

View Set

Module 04: Security and Safety Quiz

View Set

Gero Mini exam 5 Practice Questions

View Set