Chapter 1 (CCNA S)
What is a significant characteristic of virus malware?
A virus is triggered by an event on the host system.
What is the primary means for mitigating virus and Trojan horse attacks?
Antivirus
What is the meaning of the principle of minimum trust when used to design network security?
Devices in networks should not access and use one another unnecessarily and unconditionally.
Antivirus software can prevent viruses from entering the network.
False
What functional area of the Cisco Network Foundation Protection framework uses protocols such as Telnet and SSH to manage network devices?
Management Plane
Which two statements describe access attacks? (Choose two.)
Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers. Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or exploit systems to execute malicious code.
Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network attacks?
Security Intelligence Operations
Which three options describe the phases of worm mitigation? (Choose three.)
The containment phase requires the use of incoming and outgoing ACLs on routers and firewalls. The inoculation phase patches uninfected systems with the appropriate vendor patch for the vulnerability. The treatment phase disinfects actively infected systems.
Which two are characteristics of DoS attacks? (Choose two.)
They attempt to compromise the availability of a network, host, or application. Examples include smurf attacks and ping of death attacks.
Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)
anti-spoofing technologies intrusion protection systems
How does a DoS attack take advantage of the stateful condition of target systems?
by continuously sending packets of unexpected size or unexpected data
The Cisco Network Foundation Protection framework has three functional areas. The ________ �plane of a router is responsible for routing packets correctly.
data
Which statement accurately characterizes the evolution of network security?
nternal threats can cause even greater damage than external threats.
What is considered a valid method of securing the control plane in the Cisco NFP framework?
routing protocol�authentication
What is hyperjacking?
taking over a virtual machine hypervisor as part of a data center attack
What are two purposes of launching a reconnaissance attack on a network? (Choose two.)
to gather information about the network and devices to scan for accessibility
What is a main purpose of launching an access attack on network systems?
to retrieve data
Which security measure is typically found both inside and outside a data center facility?
video surveillance
Which type of security threat can be described as software that attaches to another program to execute a specific unwanted function?
virus
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?
virus infection