Check answers here:
Modules 13 – 17: Threats and Attacks Group Exam (Answers)
Quiz-summary
0 of 52 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
Information
Modules 13 - 17: Threats and Attacks Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 52 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- Answered
- Review
-
Question 1 of 52
1. Question
1 pointsWhat is the significant characteristic of worm malware?Correct
Incorrect
-
Question 2 of 52
2. Question
1 pointsWhat are the three major components of a worm attack? (Choose three.)Correct
Incorrect
-
Question 3 of 52
3. Question
1 pointsA user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.)Correct
Incorrect
-
Question 4 of 52
4. Question
1 pointsWhich two types of attacks are examples of reconnaissance attacks? (Choose two.)Correct
Incorrect
-
Question 5 of 52
5. Question
1 pointsAn administrator discovers a vulnerability in the network. On analysis of the vulnerability the administrator decides the cost of managing the risk outweighs the cost of the risk itself. The risk is accepted, and no action is taken. What risk management strategy has been adopted?Correct
Incorrect
-
Question 6 of 52
6. Question
1 pointsWhich protocol is exploited by cybercriminals who create malicious iFrames?Correct
Incorrect
-
Question 7 of 52
7. Question
1 pointsHow can a DNS tunneling attack be mitigated?Correct
Incorrect
-
Question 8 of 52
8. Question
1 pointsWhat is the function of a gratuitous ARP sent by a networked device when it boots up?Correct
Incorrect
-
Question 9 of 52
9. Question
1 pointsWhat is the result of a passive ARP poisoning attack?Correct
Incorrect
-
Question 10 of 52
10. Question
1 pointsWhat are two methods used by cybercriminals to mask DNS attacks? (Choose two.)Correct
Incorrect
-
Question 11 of 52
11. Question
1 pointsMatch the security tool with the description. (Not all options apply.)Correct
Incorrect
-
Question 12 of 52
12. Question
1 pointsMatch the type of cyberattackers to the description. (Not all options are used.)Correct
Incorrect
-
Question 13 of 52
13. Question
1 pointsMatch the threat actors with the descriptions. (Not all options are used.)Correct
Incorrect
-
Question 14 of 52
14. Question
1 pointsWhat scenario describes a vulnerability broker?Correct
Incorrect
-
Question 15 of 52
15. Question
1 pointsIn what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?Correct
Incorrect
-
Question 16 of 52
16. Question
1 pointsWhich field in the IPv6 header points to optional network layer information that is carried in the IPv6 packet?Correct
Incorrect
-
Question 17 of 52
17. Question
1 pointsWhich type of attack is carried out by threat actors against a network to determine which IP addresses, protocols, and ports are allowed by ACLs?Correct
Incorrect
-
Question 18 of 52
18. Question
1 pointsWhat kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?Correct
Incorrect
-
Question 19 of 52
19. Question
1 pointsWhat are two purposes of launching a reconnaissance attack on a network? (Choose two.)Correct
Incorrect
-
Question 20 of 52
20. Question
1 pointsWhich type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?Correct
Incorrect
-
Question 21 of 52
21. Question
1 pointsWhat functionality is provided by Cisco SPAN in a switched network?Correct
Incorrect
-
Question 22 of 52
22. Question
1 pointsWhich statement describes an operational characteristic of NetFlow?Correct
Incorrect
-
Question 23 of 52
23. Question
1 pointsMatch the network monitoring solution with a description. (Not all options are used.)Correct
Incorrect
-
Question 24 of 52
24. Question
1 pointsWhich technology is a proprietary SIEM system?Correct
Incorrect
-
Question 25 of 52
25. Question
1 pointsWhat are three functionalities provided by SOAR? (Choose three.)Correct
Incorrect
-
Question 26 of 52
26. Question
1 pointsWhich devices should be secured to mitigate against MAC address spoofing attacks?Correct
Incorrect
-
Question 27 of 52
27. Question
1 pointsA network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?Correct
Incorrect
-
Question 28 of 52
28. Question
1 pointsWhat is a vulnerability that allows criminals to inject scripts into web pages viewed by users?Correct
Incorrect
-
Question 29 of 52
29. Question
1 pointsWhich cyber attack involves a coordinated attack from a botnet of zombie computers?Correct
Incorrect
-
Question 30 of 52
30. Question
1 pointsWhat technique is a security attack that depletes the pool of IP addresses available for legitimate hosts?Correct
Incorrect
-
Question 31 of 52
31. Question
1 pointsWhich type of Trojan horse security breach uses the computer of the victim as the source device to launch other attacks?Correct
Incorrect
-
Question 32 of 52
32. Question
1 pointsWhat are two examples of DoS attacks? (Choose two.)Correct
Incorrect
-
Question 33 of 52
33. Question
1 pointsWhy would a rootkit be used by a hacker?Correct
Incorrect
-
Question 34 of 52
34. Question
1 pointsWhat causes a buffer overflow?Correct
Incorrect
-
Question 35 of 52
35. Question
1 pointsWhich type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?Correct
Incorrect
-
Question 36 of 52
36. Question
1 pointsWhich two types of hackers are typically classified as grey hat hackers? (Choose two.)Correct
Incorrect
-
Question 37 of 52
37. Question
1 pointsA white hat hacker is using a security tool called Skipfish to discover the vulnerabilities of a computer system. What type of tool is this?Correct
Incorrect
-
Question 38 of 52
38. Question
1 pointsWhich two functions are provided by NetFlow? (Choose two.)Correct
Incorrect
-
Question 39 of 52
39. Question
1 pointsWhich statement describes the function of the SPAN tool used in a Cisco switch?Correct
Incorrect
-
Question 40 of 52
40. Question
1 pointsWhat are two evasion methods used by hackers? (Choose two.)Correct
Incorrect
-
Question 41 of 52
41. Question
1 pointsWhich attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?Correct
Incorrect
-
Question 42 of 52
42. Question
1 pointsWhat is the goal of a white hat hacker?Correct
Incorrect
-
Question 43 of 52
43. Question
1 pointsOnce a cyber threat has been verified, the US Cybersecurity Infrastructure and Security Agency (CISA) automatically shares the cybersecurity information with public and private organizations. What is this automated system called?Correct
Incorrect
-
Question 44 of 52
44. Question
1 pointsA user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?Correct
Incorrect
-
Question 45 of 52
45. Question
1 pointsWhich two characteristics describe a worm? (Choose two)Correct
Incorrect
-
Question 46 of 52
46. Question
1 pointsAn attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?Correct
Incorrect
-
Question 47 of 52
47. Question
1 pointsWhat would be the target of an SQL injection attack?Correct
Incorrect
-
Question 48 of 52
48. Question
1 pointsThe IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?Correct
Incorrect
-
Question 49 of 52
49. Question
1 pointsWhy would an attacker want to spoof a MAC address?Correct
Incorrect
-
Question 50 of 52
50. Question
1 pointsMatch the security concept to the description.Correct
Incorrect
-
Question 51 of 52
51. Question
1 pointsWhich two characteristics describe a virus? (Choose two.)Correct
Incorrect
-
Question 52 of 52
52. Question
1 pointsWhich type of security attack would attempt a buffer overflow?Correct
Incorrect