Quiz 1 Flashcards

1
Q

A company has several sales offices distributed within a city. Each sales office has a SOHO network. What are two security features that are commonly found in such a network configuration? (Choose two.)

a.
Virtual Security Gateway within Cisco Nexus switches

b.
WPA2

c.
port security on user facing ports

d.
Cisco ASA firewall

e.
biometric verifications

A

b.
WPA2

c.
port security on user facing ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an objective of a state-sponsored attack?

a.
to gain attention

b.
to gain financial prosperity

c.
to right a perceived wrong

d.
to sell operating system vulnerabilities to other hackers

A

c.
to right a perceived wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

used to probe and test a firewall’s robustness using specially made forged packets.

Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools

A

Packet Crafting Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to capture and analyze packets within traditional Ethernet LANs or WANS.

Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools

A

Packet Sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used to probe network devices, servers, and hosts for open TCP or UDP ports.

Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools

A

Network Scanning & Hacking Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

used by black hats to reverse engineer binary files when writing exploits.

Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools

A

Debuggers Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network?

a.
Implement encryption for sensitive traffic.

b.
Implement a firewall at the edge of the network.

c.
Implement access lists on the border router.

d.
Implement restrictions on the use of ICMP echo-reply messages.

A

not c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a reconnaissance attack on a computer network?

a.
to gather information about the target network and system

b.
to redirect data traffic so that it can be monitored

c.
to prevent users from accessing network resources

d.
to steal data from the network servers

A

a.
to gather information about the target network and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two data protection functions provided by MDM? (Choose two.)

a.
quarantine

b.
remote wiping

c.
physical security

d.
PIN locking

e.
inoculation

A

b.
remote wiping

d.
PIN locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a ping sweep?

a.
a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services.

b.
a software application that enables the capture of all network packets that are sent across a LAN.

c.
a query and response protocol that identifies information about a domain, including the addresses that are assigned to that domain.

d.
a network scanning technique that indicates the live hosts in a range of IP addresses.

A

d.
a network scanning technique that indicates the live hosts in a range of IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which security implementation will provide management plane protection for a network device?

a.
access control lists

b.
antispoofing

c.
role-based access control

d.
routing protocol authentication

A

c.
role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?

a.
data loss through access to personal or corporate instant messaging and social media sites

b.
gaining illegal access to corporate data by stealing passwords or cracking weak passwords

c.
sensitive data lost through access to the cloud that has been compromised due to weak security settings

d.
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

A

a.
data loss through access to personal or corporate instant messaging and social media sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Payment is usually made using wire transfer or crypto currencies such as Bitcoin.

Ransomware
Worm
Rootkit
Adware
Spyware

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

using pop-up web browser windows, new toolbars, or unexpectedly redirect a webpage to a different website.

Ransomware
Worm
Rootkit
Adware
Spyware

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

very difficult to detect because they can alter firewall, system files, and even OS commands to conceal their presence.

Ransomware
Worm
Rootkit
Adware
Spyware

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to removable media?

a.
data loss through access to personal or corporate instant messaging and social media sites

b.
the potential of causing great damage because of direct access to the building and its infrastructure devices

c.
the unauthorized transfer of data containing valuable corporate information to a USB drive

d.
sensitive data lost through access to the cloud that has been compromised due to weak security settings

A

c.
the unauthorized transfer of data containing valuable corporate information to a USB drive

17
Q

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

a.
RouterA(config)# login block-for 10 attempts 2 within 30

b.
RouterA(config)# login block-for 2 attempts 30 within 10

c.
RouterA(config)# login block-for 30 attempts 2 within 10

d.
RouterA(config)# login block-for 30 attempts 10 within 2

A

c.
RouterA(config)# login block-for 30 attempts 2 within 10

18
Q

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?

a.
the path by which a threat actor can gain access to a server, host, or network

b.
gaining illegal access to corporate data by stealing passwords or cracking weak passwords

c.
sensitive data lost through access to the cloud that has been compromised due to weak security settings

d.
the potential of causing great damage because of direct access to the building and its infrastructure devices

A

a.
the path by which a threat actor can gain access to a server, host, or network

19
Q

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?

a.
the unauthorized transfer of data containing valuable corporate information to a USB drive

b.
the path by which a threat actor can gain access to a server, host, or network

c.
data loss through access to personal or corporate instant messaging and social media sites

d.
intercepted emails that reveal confidential corporate or personal information

A

b.
the path by which a threat actor can gain access to a server, host, or network

20
Q

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?

a.
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

b.
gaining illegal access to corporate data by stealing passwords or cracking weak passwords

c.
intercepted emails that reveal confidential corporate or personal information

d.
sensitive data lost through access to the cloud that has been compromised due to weak security settings

A

d.
sensitive data lost through access to the cloud that has been compromised due to weak security settings

21
Q

What is a characteristic of a Trojan horse as it relates to network security?

a.
Malware is contained in a seemingly legitimate executable program.

b.
An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.

c.
Too much information is destined for a particular memory block, causing additional memory areas to be affected.

d.
Extreme quantities of data are sent to a particular network device interface.

A

a.
Malware is contained in a seemingly legitimate executable program.

22
Q

What role does the Security Intelligence Operations (SIO) play in the Cisco SecureX architecture?

a.
identifying applications

b.
identifying and stopping malicious traffic

c.
authenticating users

d.
enforcing policy

A

b.
identifying and stopping malicious traffic

23
Q

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

a.
This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

b.
This command enables a strong encryption algorithm for the enable secret password command.

c.
This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.

d.
This command prevents someone from viewing the running configuration passwords.

e.
This command encrypts passwords as they are transmitted across serial WAN links.

A

not a

24
Q

There are two major types of DoS attacks defined in Cisco Network Academy. Explain with examples using your own words.

A

Answer text
Overwhelming quantity of traffic. In this DoS attack, it sends out a huge amount of traffic to a server in which it cannot handle, thus, resulting to being confused of what to do next and not doing its proper job. Example, when a threat actor continuously send a ping, crashing the server. It can also used a ping of death, in which it gives a huge ping exceeding what the server is capable of.

Maliciously formatted packet. In this DoS attack, it formats the packet to confused most commonly the IPS. Example, it can send an extra bit to the packet, or change something there from ASCII to Unicode.

25
Q

According to Cisco Network Academy, what are the three components of a worm attack? Briefly describe each of them.

A

Answer text
enabling vulnerabilities - this is the first step of how a worm attacks. In this case, once the worm is in the network or in the computer, it searches for the vulnerabilities that is compliance to what and how the worm is programmed.

propagation mechanism - then, it will spread once it found its weakness (vulnerability), the other computers who has the same attributes to those who are infected will also now be infected and will be used to spread it more.

payload - payload is the action taken as a result of the first two steps. It is like a countermeasure but from the worm to the targeted network and computers.

26
Q

Cisco uses View to set up role-based CLI administration access control. Explain the major differences among view, root view, and superview.

A

Answer text
root view - in the root view, it can create views and superviews while in view and superview cannot. Here once the AAA is enabled, it can make the CLI and superview. Root view also functions like privilege level 15 except that the level 15 cannot create view and superview.

view or CLI - in view, it can now create specific commands that is only for that specific view / CLI. It can have a range of 1 - 65535 views. This is used for the specified roles of which commands you want to assign to that view.

superview - in superview, you can have a cli in a multiple superviews. With this, it is more flexible and granular. Also, you can access all the commands in view/CLI only if you are in that within superview. You can also access other superviews using password or go from CLI to superview.

Major difference is that view and superview will not exist without going through root view. Once in root view, it then now can create views /CLI and superview. Superview will not exist without the views /CLI.

27
Q

In the Network Academy, Cisco mentioned that data center physical security can be divided into two areas. Explain these two security areas with examples using your own words.

A

Answer text
Inside perimeter areas consist of security traps, biometrics / facial recognition, ID. It also has their heat and aircon ventilation since data centers hold various large amount of data, also has fire alarms. Outside perimeter areas includes gates, fences, guards. Both have the continuous surveillance camera installed.

Comment:
Explain with examples, not just list the examples