Professional Documents
Culture Documents
Chapter1Quiz:CCNAS2016
Chapter1Quiz
Fechalmite Nohayfechadevencimiento
Puntos 30
Preguntas 15
Tiempolmite 60minutos
Intentospermitidos 3
Instrucciones
ThisquizcoversthecontentinCCNASecurity:ImplementingNetworkSecurity2.0Chapter1.Itisdesignedtoprovideanadditionalopportunitytopracticetheskillsandknowledge
presentedinthechapterandtopreparefortheChapterExam.Youwillbeallowedmultipleattemptsandthegradedoesnotappearinthegradebook.
Therearemultipletasktypesthatmaybeavailableinthisquiz.Ratherthanhavingstaticgraphicstoview,someitemsmayrequireyoutoopenaPTactivityandperformsome
investigationandconfigurationofdevicesbeforeansweringthequestion.
NOTE:TherearesomesmalldifferencesinhowthequestionsscoreandoperateintheQuizandhowtheyscoreandoperateintheChapterExam.Quizzesallowforpartialcredit
scoringonallitemtypestofosterlearning.Pointsonquizzescanalsobedeductedforansweringincorrectly.ThisdoesnotoccurwiththeChapterExam.
Form30526
Volverarealizarlaevaluacin
Historialdeintentos
ELLTIMO
Intento
Tiempo
Calificacin
Intento1
30minutos
14de30
Lasrespuestascorrectasestnocultas.
Enviado14Junen21:32
Pregunta1
2/2pts
Whataretwopurposesoflaunchingareconnaissanceattackonanetwork?(Choosetwo.)
toretrieveandm odifydata
tos canforacces s ibility
toes calateacces s privileges
togatherinform ationaboutthenetworkanddevices
topreventotherus ers from acces s ingthes ys tem
Refertocurriculum topic:1.2.4
Gatheringinform ationaboutanetworkands canningforacces s is areconnais s anceattack.Preventingotherus ers from acces s inga
s ys tem is adenialofs erviceattack.Attem ptingtoretrieveandm odifydata,andattem ptingtoes calateacces s privileges aretypes ofacces s
attacks .
Pregunta2
2/2pts
Whichstatementdescribesphonefreaking?
Ahackerus es aprogram thatautom aticallys cans telephonenum bers withinalocalarea,dialingeachoneins earchofcom puters ,
bulletinboards ys tem s ,andfaxm achines .
https://1375232.netacad.com/courses/382814/quizzes/2957131
1/6
15/6/2016
Chapter1Quiz:CCNAS2016
Refertocurriculum topic:1.2.1
Thereas onphonephreakingworkedwas becaus eAT&Tintroduceddigitalphones witches totheirnetwork.Thes es witches us edvarious
tones ortonedialing,toperform functions s uchas dialingorcallterm ination.TodayvoiceoverIP(VoIP)calls canbehackedbys niffingthe
network.
Incorrecto
0/2pts
Pregunta3
WhichCisconetworksecuritytoolisacloudbasedservicethatprovidesalertstonetworkprofessionalsaboutcurrentnetworkattacks?
IPS
SnortIDS
SecurityIntelligenceOperations
zonebas edpolicyfirewall
Refertocurriculum topic:1.1.1
TheCis coSecurityIntelligenceOperations (SIO)arrivedin2010andis acloudbas eds ervicethatconnects globalthreatinform ation,
reputationbas eds ervices ,ands ophis ticatedanalys is toCis conetworks ecuritydevices toprovides trongerprotectionwithfas terres pons e
tim es .
Incorrecto
Pregunta4
0/2pts
Whattypeofmalwarehastheprimaryobjectiveofspreadingacrossthenetwork?
worm
virus
Trojanhors e
botnet
Refertocurriculum topic:1.2.3
Them ainpurpos eofaworm is tos elfreplicateandpropagateacros s thenetwork.Avirus is atypeofm alicious s oftwarethatneeds aus er
tos pread.Atrojanhors eis nots elfreplicatinganddis guis es its elfas alegitim ateapplicationwhenitis not.Abotnetis as eries ofzom bie
com puters workingtogethertowageanetworkattack.
Incorrecto
Pregunta5
0/2pts
Fillintheblank.
TheCiscoNetworkFoundationProtectionframeworkhasthreefunctionalareas.The Managem ent
planeofarouterisresponsible
forroutingpacketscorrectly.
Respuesta1:
Management
https://1375232.netacad.com/courses/382814/quizzes/2957131
2/6
15/6/2016
Chapter1Quiz:CCNAS2016
Refertocurriculum topic:1.3.5
Thedataplaneofarouteris res pons ibleforroutingtraffic.Theothertwoplanes definedbytheCis coNetworkFoundationProtection(NFP)
fram eworkarethecontrolplaneandthem anagem entplane.
Incorrecto
Pregunta6
0/2pts
Whatisthemeaningoftheprincipleofminimumtrustwhenusedtodesignnetworksecurity?
Refertocurriculum topic:1.3.4
Theprincipleofm inim um trus tm eans thatnetworks ys tem s s houldnotacces s andus eoneanotherunneces s arilyandunconditionally.
Theotheroptions arevalidnetworks ecurityacces s protections butdonotrelatetotheprincipleofm inim um trus t.
Pregunta7
2/2pts
WhatistheprimarymeansformitigatingvirusandTrojanhorseattacks?
antivirus s oftware
encryption
antis niffers oftware
blockingICMPechoandechoreplies
Refertocurriculum topic:1.3.4
Antivirus s oftwareis theprim arym eans ofm itigatingbothvirus andTrojanhors eattacks .Byus inguptodateantivirus s oftware,thes pread
ofvirus es andTrojanhors eattacks canbereduced.
Incorrecto
Pregunta8
0/2pts
Usersreporttothehelpdeskthaticonsusuallyseenonthemenubararerandomlyappearingontheircomputerscreens.Whatcouldbea
reasonthatcomputersaredisplayingtheserandomgraphics?
https://1375232.netacad.com/courses/382814/quizzes/2957131
3/6
15/6/2016
Chapter1Quiz:CCNAS2016
Refertocurriculum topic:1.2.3
Avirus s uchas this is harm les s ,buts tillneeds toberem oved.Othervirus es canbedes tructiveinthattheym odifyordeletefiles onthe
localcom puterandpos s iblyothercom puters onthenetwork.
Incorrecto
Pregunta9
0/2pts
Whichsecuritymeasureistypicallyfoundbothinsideandoutsideadatacenterfacility?
agate
exits ens ors
s ecuritytraps
biom etrics acces s
continuous videos urveillance
Refertocurriculum topic:1.1.2
Continuous videos urveillanceis as ecuritym eas urefoundbothins ideandouts ideadatacenterfacility.Agateprovides outs ideperim eter
s ecurity.Securitytraps ,biom etrics acces s ,andexits ens ors provideins ideperim eters ecurity.
Incorrecto
Pregunta10
0/2pts
Whatisamainpurposeoflaunchinganaccessattackonnetworksystems?
Refertocurriculum topic:1.2.4
Gatheringinform ationaboutanetworkands canningforacces s is areconnais s anceattack.Preventingotherus ers from acces s inga
s ys tem is adenialofs erviceattack.
Incorrecto
Pregunta11
0/2pts
Whatisasignificantcharacteristicofvirusmalware?
https://1375232.netacad.com/courses/382814/quizzes/2957131
4/6
15/6/2016
Chapter1Quiz:CCNAS2016
Refertocurriculum topic:1.2.3
Avirus is m alicious codethatis attachedtoalegitim ateprogram orexecutablefile,andrequires s pecificactivation,whichm ayincludeus er
actions oratim ebas edevent.Whenactivated,avirus caninfectthefiles ithas notyetinfected,butdoes notautom aticallypropagateits elfto
others ys tem s .Selfpropagationis afeatureofworm s .Inadditiontobeingdis tributedovertheInternet,virus es areals os preadbyUSB
m em orys ticks ,CDs ,andDVDs .
Pregunta12
2/2pts
HowdoesaDoSattacktakeadvantageofthestatefulconditionoftargetsystems?
Refertocurriculum topic:1.2.4
Adictionaryofpas s words is us edbyabruteforcepas s wordattack.Virus es andotherm alwareexecutecodethatcorrupts ordeletes
s ys tem files .Am aninthem iddleattackintercepts andanalyzes orm anipulates dataas itis s entacros s thenetwork.
Pregunta13
2/2pts
Whatishyperjacking?
Refertocurriculum topic:1.1.2
Hyperjackingoccurs whenanattackerhijacks avirtualm achine(VM)hypervis orandthenus es thatVMtolaunchanattackonotherdata
centerdevices .
Pregunta14
2/2pts
TrueorFalse?
Antivirussoftwarecanpreventvirusesfromenteringthenetwork.
true
fals e
Refertocurriculum topic:1.3.4
Althoughantivirus s oftwareis theprim arym eans ofm itigatingvirus es andTrojanhors es ,itcannotpreventvirus es from enteringthe
network.
https://1375232.netacad.com/courses/382814/quizzes/2957131
5/6
15/6/2016
Chapter1Quiz:CCNAS2016
Pregunta15
2/2pts
WhatfunctionalareaoftheCiscoNetworkFoundationProtectionframeworkusesprotocolssuchasTelnetandSSHtomanagenetwork
devices?
dataplane
m anagem entplane
controlplane
forwardingplane
Refertocurriculum topic:1.3.5
Therearethreefunctionalareas oftheCis coNetworkFoundationProtection(NFP)fram ework:
Controlplane:Res pons ibleforroutingfunctions .Cons is ts ofthetrafficgeneratedbynetworkdevices tooperatethenetwork
Managem entplane:Res pons ibleform anagingnetworkdevices
Data(Forwarding)plane:Res pons ibleforforwardingus erdata
https://1375232.netacad.com/courses/382814/quizzes/2957131
6/6