Chapter 1 Network Auth and Security
Which statement accurately characterizes the evolution of network security?
Internal threats can cause even greater damage than external threats
Which two statements describe access attacks?
Port redirection attacks use a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN. Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers.
Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network attacks?
Security Intelligence Operations
Which two are characteristics of DoS attacks?
They attempt to compromise the availability of a network, host, or application. Examples include smurf attacks and ping of death attacks.
What type of malware has the primary objective of spreading across the network?
Worm
The Cisco Network Foundation Protection framework has three functional areas. The ________ �plane of a router is responsible for routing packets correctly.
management plane
What is a main purpose of launching an access attack on network systems?
to retrieve data