Time limit: 0
Quiz-summary
0 of 26 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
Information
CCNA Cyber Ops (Version 1.1) – Chapter 6 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 26 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- Answered
- Review
-
Question 1 of 26
1. Question
1 pointsWhat type of malware has the primary objective of spreading across the network?Correct
Incorrect
-
Question 2 of 26
2. Question
1 pointsWhy would a rootkit be used by a hacker?Correct
Incorrect
-
Question 3 of 26
3. Question
1 pointsWhich type of hacker is motivated to protest against political and social issues?Correct
Incorrect
-
Question 4 of 26
4. Question
1 pointsWhat is a characteristic of a Trojan horse as it relates to network security?Correct
Incorrect
-
Question 5 of 26
5. Question
1 pointsWhat is a botnet?Correct
Incorrect
-
Question 6 of 26
6. Question
1 pointsWhich type of Trojan horse security breach uses the computer of the victim as the source device to launch other attacks?Correct
Incorrect
-
Question 7 of 26
7. Question
1 pointsWhat is the primary goal of a DoS attack?Correct
Incorrect
-
Question 8 of 26
8. Question
1 pointsWhat is a main purpose of launching an access attack on network systems?Correct
Incorrect
-
Question 9 of 26
9. Question
1 pointsWhat causes a buffer overflow?Correct
Incorrect
-
Question 10 of 26
10. Question
1 pointsA company pays a significant sum of money to hackers in order to regain control of an email and data server. Which type of security attack was used by the hackers?Correct
Incorrect
-
Question 11 of 26
11. Question
1 pointsWhat is the term used to describe an email that is targeting a specific person employed at a financial institution?Correct
Incorrect
-
Question 12 of 26
12. Question
1 pointsWhich access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?Correct
Incorrect
-
Question 13 of 26
13. Question
1 pointsIn what way are zombies used in security attacks?Correct
Incorrect
-
Question 14 of 26
14. Question
1 pointsWhat are two evasion methods used by hackers? (Choose two.)Correct
Incorrect
-
Question 15 of 26
15. Question
1 pointsWhat are two purposes of launching a reconnaissance attack on a network? (Choose two.)Correct
Incorrect
-
Question 16 of 26
16. Question
1 pointsWhat are three techniques used in social engineering attacks? (Choose three.)Correct
Incorrect
-
Question 17 of 26
17. Question
1 pointsAn attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?Correct
Incorrect
-
Question 18 of 26
18. Question
1 pointsA user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.)Correct
Incorrect
-
Question 19 of 26
19. Question
1 pointsWhich type of security attack would attempt a buffer overflow?Correct
Incorrect
-
Question 20 of 26
20. Question
1 pointsWhat is a significant characteristic of virus malware?Correct
Incorrect
-
Question 21 of 26
21. Question
1 pointsA senior citizen receives a warning on the computer that states that the operating system registry is corrupt and to click a particular link to repair it. Which type of malware is being used to try to create the perception of a computer threat to the user?Correct
Incorrect
-
Question 22 of 26
22. Question
1 pointsWhat is the motivation of a white hat attacker?Correct
Incorrect
-
Question 23 of 26
23. Question
1 pointsWhat is a ping sweep?Correct
Incorrect
-
Question 24 of 26
24. Question
1 pointsWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?Correct
Incorrect
-
Question 25 of 26
25. Question
1 pointsWhat are the three major components of a worm attack? (Choose three.)Correct
Incorrect
-
Question 26 of 26
26. Question
1 pointsWhich security threat installs on a computer without the knowledge of the user and then monitors computer activity?Correct
Incorrect