Category: CCNA v7.0
1. Which encryption method repeats an algorithm process three times and is considered very trustworthy when implemented using very short key lifetimes? Rivest Cipher Triple DES Block Cipher Data Encryption Standard Stream Cipher 2. Which encryption method encrypts plaintext one byte or one bit at a time? Rivest …
3.9.6 Check Your Understanding – Network Security Best Practices Answers
1. Which network security device ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts? VPN ASA Firewall IPS ESA/WSA AAA Server 2. Which network security device contains a secure database of who is authorized to access and manage …
3.7.6 Check Your Understanding – TCP and UDP Vulnerabilities Answers
1. Which attack exploits the three-way handshake? TCP reset attack UDP flood attack TCP SYN Flood attack DoS attack TCP session hijacking 2. Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both …
3.6.7 Check Your Understanding – IP Vulnerabilities and Threats Answers
1. Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication? Address Spoofing Attack Amplification and Reflection Attacks ICMP Attack MiTM Attack Session Hijacking 2. Which attack is being used when threat actors gain access …
3.5.10 Check Your Understanding – Common Network Attacks Answers
1. What type of attack is tailgating? Reconnaissance Access DoS Social Engineering 2. What type of attack is a password attack? Reconnaissance Access DoS Social Engineering 3. What type of attack is port scanning? Reconnaissance Access DoS Social Engineering 4. What type of attack is man-in-the-middle? Reconnaissance Access …
3.4.4 Check Your Understanding – Malware Answers
1. Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. Adware Rootkit Spyware Virus Worm 2. Which malware is non-self-replicating type of malware? …
3.3.5 Check Your Understanding – Threat Actor Tools Answers
1. Which penetration testing tool uses algorithm schemes to encode the data, which then prevents access to the data? Packet Sniffers Encryption Tools Vulnerability Exploitation Tools Forensic Tools Debuggers 2. Which penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They …
3.2.6 Check Your Understanding – Threat Actors Answers
1. Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered. White Hat Gray Hat Black Hat 2. Which type of hacker is described in the scenario: …
3.1.4 Check Your Understanding – Current State of Cybersecurity Answers
1. Which security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data. Vulnerability Exploit Asset Risk 2. Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat? …
2.1.9 Check Your Understanding – OSPF Router ID Answers
1. True or False? In the router ospf process-id command, the process ID value, which can any number between 1 and 65,535, is locally significant. It must be the same on all routers in the OSPF area. True False 2. Which of the following applies to the router …