Author: ITExamAnswers

Module 20: Threat Intelligence Quiz Answers

1. Which service is provided by the Cisco Talos Group? collecting information about active, existing, and emerging threats preventing online malware from affecting end user devices preventing viruses from affecting end user devices scanning updates for malware code 2. What does the MITRE Corporation create and maintain? IOC …

Module 19: Access Control Quiz Answers

1. Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform? auditing authorization authentication accounting 2. What is the biggest issue with local implementation of AAA? Local implementation cannot provide secure authentication. Local implementation supports …

Module 18: Understanding Defense Quiz Answers

1. How does BYOD change the way in which businesses implement networks?​ BYOD devices are more expensive than devices that are purchased by an organization. BYOD provides flexibility in where and how users can access network resources. BYOD requires organizations to purchase laptops rather than desktops. BYOD users …

Module 17: Attacking What We Do Quiz Answers

1. Which action best describes a MAC address spoofing attack? flooding the LAN with excessive traffic bombarding a switch with fake source MAC addresses altering the MAC address of an attacking host to match that of a legitimate host forcing the election of a rogue root bridge 2. …

Module 16: Attacking the Foundation Quiz Answers

1. Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack? DNS poisoning session hijacking SYN flood DDoS …

Module 14: Common Threats and Attacks Quiz Answers

1. Which is an example of social engineering? an unidentified person claiming to be a technician collecting user information from employees a computer displaying unauthorized pop-ups and adware an anonymous programmer directing a DDoS attack on a data center the infection of a computer by a virus carried …