Chapter 1 Quiz Fecha límite No hay fecha de vencimiento
Puntos 30
Preguntas 15
Tiempo límite 60 minutos
Intentos permitidos 3
Instrucciones This quiz covers the content in CCNA Security: Implementing Network Security 2.0 Chapter 1. It is designed to provide an additional opportunity to practice the skills and knowledge presented in the chapter and to prepare for the Chapter Exam. You will be allowed multiple attempts and the grade does not appear in the gradebook. There are multiple task types that may be available in this quiz. Rather than having static graphics to view, some items may require you to open a PT activity and perform some investigation and configuration of devices before answering the question. NOTE: There are some small differences in how the questions score and operate in the Quiz and how they score and operate in the Chapter Exam. Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can also be deducted for answering incorrectly. This does not occur with the Chapter Exam. Form 30526
Volver a realizar la evaluación
Historial de intentos
EL ÚLTIMO
Intento
Tiempo
Calificación
Intento 1
30 minutos
14 de 30
Las respuestas correctas están ocultas. Enviado 14 Jun en 21:32
Pregunta 1
2 / 2 pts
What are two purposes of launching a reconnaissance attack on a network? (Choose two.)
to retrieve and m odify data to s can for acces s ibility to es calate acces s privileges to gather inform ation about the network and devices to prevent other us ers from acces s ing the s ys tem
Refer to curriculum topic: 1.2.4 Gathering inform ation about a network and s canning for acces s is a reconnais s ance attack. Preventing other us ers from acces s ing a s ys tem is a denial of s ervice attack. Attem pting to retrieve and m odify data, and attem pting to es calate acces s privileges are types of acces s attacks .
Pregunta 2
2 / 2 pts
Which statement describes phone freaking?
A hacker us es pas s wordcracking program s to gain acces s to a com puter via a dialup account. A hacker gains unauthorized acces s to networks via wireles s acces s points . A hacker m im ics a tone us ing a whis tle to m ake free longdis tance calls on an analog telephone network. A hacker us es a program that autom atically s cans telephone num bers within a local area, dialing each one in s earch of com puters , bulletin board s ys tem s , and fax m achines .
Refer to curriculum topic: 1.2.1 The reas on phone phreaking worked was becaus e AT&T introduced digital phone s witches to their network. Thes e s witches us ed various tones or tone dialing, to perform functions s uch as dialing or call term ination. Today voice over IP (VoIP) calls can be hacked by s niffing the network.
Incorrecto
0 / 2 pts
Pregunta 3
Which Cisco network security tool is a cloudbased service that provides alerts to network professionals about current network attacks?
IPS Snort IDS Security Intelligence Operations zonebas ed policy firewall
Refer to curriculum topic: 1.1.1 The Cis co Security Intelligence Operations (SIO) arrived in 2010 and is a cloudbas ed s ervice that connects global threat inform ation, reputationbas ed s ervices , and s ophis ticated analys is to Cis co network s ecurity devices to provide s tronger protection with fas ter res pons e tim es .
Incorrecto
Pregunta 4
0 / 2 pts
What type of malware has the primary objective of spreading across the network?
worm virus Trojan hors e botnet
Refer to curriculum topic: 1.2.3 The m ain purpos e of a worm is to s elfreplicate and propagate acros s the network. A virus is a type of m alicious s oftware that needs a us er to s pread. A trojan hors e is not s elfreplicating and dis guis es its elf as a legitim ate application when it is not. A botnet is a s eries of zom bie com puters working together to wage a network attack.
Incorrecto
Pregunta 5
0 / 2 pts
Fill in the blank. The Cisco Network Foundation Protection framework has three functional areas. The Managem ent
Refer to curriculum topic: 1.3.5 The data plane of a router is res pons ible for routing traffic. The other two planes defined by the Cis co Network Foundation Protection (NFP) fram ework are the control plane and the m anagem ent plane.
Incorrecto
Pregunta 6
0 / 2 pts
What is the meaning of the principle of minimum trust when used to design network security?
All network and internetwork data com m unications s hould be encrypted. Accounts s hould be dis abled after a s pecific num ber of uns ucces s ful logins . Devices in networks s hould not acces s and us e one another unneces s arily and unconditionally. Encrypted and onetim e pas s words s hould be us ed at all tim es . Network acces s s hould be controlled by m ultifactor authentication.
Refer to curriculum topic: 1.3.4 The principle of m inim um trus t m eans that network s ys tem s s hould not acces s and us e one another unneces s arily and unconditionally. The other options are valid network s ecurity acces s protections but do not relate to the principle of m inim um trus t.
Pregunta 7
2 / 2 pts
What is the primary means for mitigating virus and Trojan horse attacks?
antivirus s oftware encryption antis niffer s oftware blocking ICMP echo and echoreplies
Refer to curriculum topic: 1.3.4 Antivirus s oftware is the prim ary m eans of m itigating both virus and Trojan hors e attacks . By us ing uptodate antivirus s oftware, the s pread of virus es and Trojan hors e attacks can be reduced.
Incorrecto
Pregunta 8
0 / 2 pts
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?
An acces s attack has occurred. A virus has infected the com puters . A DoS attack has been launched agains t the network. The com puters are s ubject to a reconnais s ance attack.
Refer to curriculum topic: 1.2.3 A virus s uch as this is harm les s , but s till needs to be rem oved. Other virus es can be des tructive in that they m odify or delete files on the local com puter and pos s ibly other com puters on the network.
Incorrecto
Pregunta 9
0 / 2 pts
Which security measure is typically found both inside and outside a data center facility?
a gate exit s ens ors s ecurity traps biom etrics acces s continuous video s urveillance
Refer to curriculum topic: 1.1.2 Continuous video s urveillance is a s ecurity m eas ure found both ins ide and outs ide a data center facility. A gate provides outs ide perim eter s ecurity. Security traps , biom etrics acces s , and exit s ens ors provide ins ide perim eter s ecurity.
Incorrecto
Pregunta 10
0 / 2 pts
What is a main purpose of launching an access attack on network systems?
to prevent other us ers from acces s ing the s ys tem to gather inform ation about the network to s can for acces s ible networks to retrieve data
Refer to curriculum topic: 1.2.4 Gathering inform ation about a network and s canning for acces s is a reconnais s ance attack. Preventing other us ers from acces s ing a s ys tem is a denial of s ervice attack.
Incorrecto
Pregunta 11
0 / 2 pts
What is a significant characteristic of virus malware?
A virus is triggered by an event on the hos t s ys tem . Once ins talled on a hos t s ys tem , a virus will autom atically propagate its elf to other s ys tem s . A virus can execute independently of the hos t s ys tem . Virus m alware is only dis tributed over the Internet.
Refer to curriculum topic: 1.2.3 A virus is m alicious code that is attached to a legitim ate program or executable file, and requires s pecific activation, which m ay include us er actions or a tim ebas ed event. When activated, a virus can infect the files it has not yet infected, but does not autom atically propagate its elf to other s ys tem s . Selfpropagation is a feature of worm s . In addition to being dis tributed over the Internet, virus es are als o s pread by USB m em ory s ticks , CDs , and DVDs .
Pregunta 12
2 / 2 pts
How does a DoS attack take advantage of the stateful condition of target systems?
by executing code that corrupts or deletes s ys tem files by continuous ly s ending packets of unexpected s ize or unexpected data by us ing a dictionary of pas s words to attem pt to acces s the s ys tem by intercepting and analyzing or m anipulating data as it is s ent acros s the network
Refer to curriculum topic: 1.2.4 A dictionary of pas s words is us ed by a brute force pas s word attack. Virus es and other m alware execute code that corrupts or deletes s ys tem files . A m aninthem iddle attack intercepts and analyzes or m anipulates data as it is s ent acros s the network.
Pregunta 13
2 / 2 pts
What is hyperjacking?
taking over a virtual m achine hypervis or as part of a data center attack overclocking the m es h network which connects the data center s ervers adding outdated s ecurity s oftware to a virtual m achine to gain acces s to a data center s erver us ing proces s ors from m ultiple com puters to increas e data proces s ing power
Refer to curriculum topic: 1.1.2 Hyperjacking occurs when an attacker hijacks a virtual m achine (VM) hypervis or and then us es that VM to launch an attack on other data center devices .
Pregunta 14
2 / 2 pts
True or False? Antivirus software can prevent viruses from entering the network.
true fals e
Refer to curriculum topic: 1.3.4 Although antivirus s oftware is the prim ary m eans of m itigating virus es and Trojan hors es , it cannot prevent virus es from entering the network.
What functional area of the Cisco Network Foundation Protection framework uses protocols such as Telnet and SSH to manage network devices?
data plane m anagem ent plane control plane forwarding plane
Refer to curriculum topic: 1.3.5 There are three functional areas of the Cis co Network Foundation Protection (NFP) fram ework: Control plane: Res pons ible for routing functions . Cons is ts of the traffic generated by network devices to operate the network Managem ent plane: Res pons ible for m anaging network devices Data (Forwarding) plane: Res pons ible for forwarding us er data