Time limit: 0
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
Good luck to you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
1 pointsWhat method can be used to mitigate ping sweeps?Correct
Incorrect
-
Question 2 of 25
2. Question
1 pointsWhat are the three major components of a worm attack? (Choose three.)Correct
Incorrect
-
Question 3 of 25
3. Question
1 pointsWhich statement accurately characterizes the evolution of threats to network security?Correct
Incorrect
-
Question 4 of 25
4. Question
1 pointsWhat causes a buffer overflow?Correct
Incorrect
-
Question 5 of 25
5. Question
1 pointsWhat commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?Correct
Incorrect
-
Question 6 of 25
6. Question
1 pointsWhich two network security solutions can be used to mitigate DoS attacks? (Choose two.)Correct
Incorrect
-
Question 7 of 25
7. Question
1 pointsAn attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?Correct
Incorrect
-
Question 8 of 25
8. Question
1 pointsWhat functional area of the Cisco Network Foundation Protection framework is responsible for device-generated packets required for network operation, such as ARP message exchanges and routing advertisements?Correct
Incorrect
-
Question 9 of 25
9. Question
1 pointsWhat are the three components of information security ensured by cryptography? (Choose three.)Correct
Incorrect
-
Question 10 of 25
10. Question
1 pointsWhat is the primary method for mitigating malware?Correct
Incorrect
-
Question 11 of 25
11. Question
1 pointsWhat is an objective of a state-sponsored attack?Correct
Incorrect
-
Question 12 of 25
12. Question
1 pointsWhat role does the Security Intelligence Operations (SIO) play in the Cisco SecureX architecture?Correct
Incorrect
-
Question 13 of 25
13. Question
1 pointsHow is a smurf attack conducted?Correct
Incorrect
-
Question 14 of 25
14. Question
1 pointsWhat is a characteristic of a Trojan horse as it relates to network security?Correct
Incorrect
-
Question 15 of 25
15. Question
1 pointsWhat is the first step in the risk management process specified by the ISO/IEC?Correct
Incorrect
-
Question 16 of 25
16. Question
1 pointsWhat is the significant characteristic of worm malware?Correct
Incorrect
-
Question 17 of 25
17. Question
1 pointsWhich condition describes the potential threat created by Instant On in a data center?Correct
Incorrect
-
Question 18 of 25
18. Question
1 pointsWhat are the three core components of the Cisco Secure Data Center solution? (Choose three.)Correct
Incorrect
-
Question 19 of 25
19. Question
1 pointsA disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?Correct
Incorrect
-
Question 20 of 25
20. Question
1 pointsWhich two statements describe access attacks? (Choose two.)Correct
Incorrect
-
Question 21 of 25
21. Question
1 pointsWhat is a ping sweep?Correct
Incorrect
-
Question 22 of 25
22. Question
1 pointsFill in blanks- As a dedicated network security tool, an intrusion (Protection) system can provide detection and blocking of attacks in real time.
Correct
Incorrect
-
Question 23 of 25
23. Question
1 pointsWhich two statements characterize DoS attacks? (Choose two.)Correct
Incorrect
-
Question 24 of 25
24. Question
1 pointsWhat worm mitigation phase involves actively disinfecting infected systems?Correct
Incorrect
-
Question 25 of 25
25. Question
1 pointsWhat is the role of an IPS?Correct
Incorrect
Intrusion PROTECTION???? this is exactly the opposite term!
can someone correct?
18 is prevention not Protection