Chapter 1 (CCNA S)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a significant characteristic of virus malware?

A virus is triggered by an event on the host system.

What is the primary means for mitigating virus and Trojan horse attacks?

Antivirus

What is the meaning of the principle of minimum trust when used to design network security?

Devices in networks should not access and use one another unnecessarily and unconditionally.

Antivirus software can prevent viruses from entering the network.

False

What functional area of the Cisco Network Foundation Protection framework uses protocols such as Telnet and SSH to manage network devices?

Management Plane

Which two statements describe access attacks? (Choose two.)

Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers. Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or exploit systems to execute malicious code.

Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network attacks?

Security Intelligence Operations

Which three options describe the phases of worm mitigation? (Choose three.)

The containment phase requires the use of incoming and outgoing ACLs on routers and firewalls. The inoculation phase patches uninfected systems with the appropriate vendor patch for the vulnerability. The treatment phase disinfects actively infected systems.

Which two are characteristics of DoS attacks? (Choose two.)

They attempt to compromise the availability of a network, host, or application. Examples include smurf attacks and ping of death attacks.

Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)

anti-spoofing technologies intrusion protection systems

How does a DoS attack take advantage of the stateful condition of target systems?

by continuously sending packets of unexpected size or unexpected data

The Cisco Network Foundation Protection framework has three functional areas. The ________ �plane of a router is responsible for routing packets correctly.

data

Which statement accurately characterizes the evolution of network security?

nternal threats can cause even greater damage than external threats.

What is considered a valid method of securing the control plane in the Cisco NFP framework?

routing protocol�authentication

What is hyperjacking?

taking over a virtual machine hypervisor as part of a data center attack

What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

to gather information about the network and devices to scan for accessibility

What is a main purpose of launching an access attack on network systems?

to retrieve data

Which security measure is typically found both inside and outside a data center facility?

video surveillance

Which type of security threat can be described as software that attaches to another program to execute a specific unwanted function?

virus

Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?

virus infection


संबंधित स्टडी सेट्स

Final exam Digital and social media

View Set

Administrative Procedures: Chapter 12

View Set

Bus Policy & Stategy Exam 2 (1-25)

View Set

Chapter 27--Seedless Plants Homework

View Set