You are on page 1of 6

15/6/2016

Chapter1Quiz:CCNAS2016

Chapter1Quiz
Fechalmite Nohayfechadevencimiento

Puntos 30

Preguntas 15

Tiempolmite 60minutos

Intentospermitidos 3

Instrucciones
ThisquizcoversthecontentinCCNASecurity:ImplementingNetworkSecurity2.0Chapter1.Itisdesignedtoprovideanadditionalopportunitytopracticetheskillsandknowledge
presentedinthechapterandtopreparefortheChapterExam.Youwillbeallowedmultipleattemptsandthegradedoesnotappearinthegradebook.
Therearemultipletasktypesthatmaybeavailableinthisquiz.Ratherthanhavingstaticgraphicstoview,someitemsmayrequireyoutoopenaPTactivityandperformsome
investigationandconfigurationofdevicesbeforeansweringthequestion.
NOTE:TherearesomesmalldifferencesinhowthequestionsscoreandoperateintheQuizandhowtheyscoreandoperateintheChapterExam.Quizzesallowforpartialcredit
scoringonallitemtypestofosterlearning.Pointsonquizzescanalsobedeductedforansweringincorrectly.ThisdoesnotoccurwiththeChapterExam.
Form30526

Volverarealizarlaevaluacin

Historialdeintentos

ELLTIMO

Intento

Tiempo

Calificacin

Intento1

30minutos

14de30

Lasrespuestascorrectasestnocultas.
Enviado14Junen21:32

Pregunta1

2/2pts

Whataretwopurposesoflaunchingareconnaissanceattackonanetwork?(Choosetwo.)

toretrieveandm odifydata
tos canforacces s ibility
toes calateacces s privileges
togatherinform ationaboutthenetworkanddevices
topreventotherus ers from acces s ingthes ys tem

Refertocurriculum topic:1.2.4
Gatheringinform ationaboutanetworkands canningforacces s is areconnais s anceattack.Preventingotherus ers from acces s inga
s ys tem is adenialofs erviceattack.Attem ptingtoretrieveandm odifydata,andattem ptingtoes calateacces s privileges aretypes ofacces s
attacks .

Pregunta2

2/2pts

Whichstatementdescribesphonefreaking?

Ahackerus es pas s wordcrackingprogram s togainacces s toacom puterviaadialupaccount.


Ahackergains unauthorizedacces s tonetworks viawireles s acces s points .
Ahackerm im ics atoneus ingawhis tletom akefreelongdis tancecalls onananalogtelephonenetwork.

Ahackerus es aprogram thatautom aticallys cans telephonenum bers withinalocalarea,dialingeachoneins earchofcom puters ,
bulletinboards ys tem s ,andfaxm achines .

https://1375232.netacad.com/courses/382814/quizzes/2957131

1/6

15/6/2016

Chapter1Quiz:CCNAS2016

Refertocurriculum topic:1.2.1
Thereas onphonephreakingworkedwas becaus eAT&Tintroduceddigitalphones witches totheirnetwork.Thes es witches us edvarious
tones ortonedialing,toperform functions s uchas dialingorcallterm ination.TodayvoiceoverIP(VoIP)calls canbehackedbys niffingthe
network.

Incorrecto

0/2pts

Pregunta3

WhichCisconetworksecuritytoolisacloudbasedservicethatprovidesalertstonetworkprofessionalsaboutcurrentnetworkattacks?

IPS
SnortIDS
SecurityIntelligenceOperations
zonebas edpolicyfirewall

Refertocurriculum topic:1.1.1
TheCis coSecurityIntelligenceOperations (SIO)arrivedin2010andis acloudbas eds ervicethatconnects globalthreatinform ation,
reputationbas eds ervices ,ands ophis ticatedanalys is toCis conetworks ecuritydevices toprovides trongerprotectionwithfas terres pons e
tim es .

Incorrecto

Pregunta4

0/2pts

Whattypeofmalwarehastheprimaryobjectiveofspreadingacrossthenetwork?

worm
virus
Trojanhors e
botnet

Refertocurriculum topic:1.2.3
Them ainpurpos eofaworm is tos elfreplicateandpropagateacros s thenetwork.Avirus is atypeofm alicious s oftwarethatneeds aus er
tos pread.Atrojanhors eis nots elfreplicatinganddis guis es its elfas alegitim ateapplicationwhenitis not.Abotnetis as eries ofzom bie
com puters workingtogethertowageanetworkattack.

Incorrecto

Pregunta5

0/2pts

Fillintheblank.
TheCiscoNetworkFoundationProtectionframeworkhasthreefunctionalareas.The Managem ent

planeofarouterisresponsible

forroutingpacketscorrectly.

Respuesta1:
Management

https://1375232.netacad.com/courses/382814/quizzes/2957131

2/6

15/6/2016

Chapter1Quiz:CCNAS2016

Refertocurriculum topic:1.3.5
Thedataplaneofarouteris res pons ibleforroutingtraffic.Theothertwoplanes definedbytheCis coNetworkFoundationProtection(NFP)
fram eworkarethecontrolplaneandthem anagem entplane.

Incorrecto

Pregunta6

0/2pts

Whatisthemeaningoftheprincipleofminimumtrustwhenusedtodesignnetworksecurity?

Allnetworkandinternetworkdatacom m unications s houldbeencrypted.


Accounts s houldbedis abledafteras pecificnum berofuns ucces s fullogins .
Devices innetworks s houldnotacces s andus eoneanotherunneces s arilyandunconditionally.
Encryptedandonetim epas s words s houldbeus edatalltim es .
Networkacces s s houldbecontrolledbym ultifactorauthentication.

Refertocurriculum topic:1.3.4
Theprincipleofm inim um trus tm eans thatnetworks ys tem s s houldnotacces s andus eoneanotherunneces s arilyandunconditionally.
Theotheroptions arevalidnetworks ecurityacces s protections butdonotrelatetotheprincipleofm inim um trus t.

Pregunta7

2/2pts

WhatistheprimarymeansformitigatingvirusandTrojanhorseattacks?

antivirus s oftware
encryption
antis niffers oftware
blockingICMPechoandechoreplies

Refertocurriculum topic:1.3.4
Antivirus s oftwareis theprim arym eans ofm itigatingbothvirus andTrojanhors eattacks .Byus inguptodateantivirus s oftware,thes pread
ofvirus es andTrojanhors eattacks canbereduced.

Incorrecto

Pregunta8

0/2pts

Usersreporttothehelpdeskthaticonsusuallyseenonthemenubararerandomlyappearingontheircomputerscreens.Whatcouldbea
reasonthatcomputersaredisplayingtheserandomgraphics?

Anacces s attackhas occurred.


Avirus has infectedthecom puters .
ADoSattackhas beenlaunchedagains tthenetwork.
Thecom puters ares ubjecttoareconnais s anceattack.

https://1375232.netacad.com/courses/382814/quizzes/2957131

3/6

15/6/2016

Chapter1Quiz:CCNAS2016

Refertocurriculum topic:1.2.3
Avirus s uchas this is harm les s ,buts tillneeds toberem oved.Othervirus es canbedes tructiveinthattheym odifyordeletefiles onthe
localcom puterandpos s iblyothercom puters onthenetwork.

Incorrecto

Pregunta9

0/2pts

Whichsecuritymeasureistypicallyfoundbothinsideandoutsideadatacenterfacility?

agate
exits ens ors
s ecuritytraps
biom etrics acces s
continuous videos urveillance

Refertocurriculum topic:1.1.2
Continuous videos urveillanceis as ecuritym eas urefoundbothins ideandouts ideadatacenterfacility.Agateprovides outs ideperim eter
s ecurity.Securitytraps ,biom etrics acces s ,andexits ens ors provideins ideperim eters ecurity.

Incorrecto

Pregunta10

0/2pts

Whatisamainpurposeoflaunchinganaccessattackonnetworksystems?

topreventotherus ers from acces s ingthes ys tem


togatherinform ationaboutthenetwork
tos canforacces s iblenetworks
toretrievedata

Refertocurriculum topic:1.2.4
Gatheringinform ationaboutanetworkands canningforacces s is areconnais s anceattack.Preventingotherus ers from acces s inga
s ys tem is adenialofs erviceattack.

Incorrecto

Pregunta11

0/2pts

Whatisasignificantcharacteristicofvirusmalware?

Avirus is triggeredbyaneventonthehos ts ys tem .


Onceins talledonahos ts ys tem ,avirus willautom aticallypropagateits elftoothers ys tem s .
Avirus canexecuteindependentlyofthehos ts ys tem .
Virus m alwareis onlydis tributedovertheInternet.

https://1375232.netacad.com/courses/382814/quizzes/2957131

4/6

15/6/2016

Chapter1Quiz:CCNAS2016

Refertocurriculum topic:1.2.3
Avirus is m alicious codethatis attachedtoalegitim ateprogram orexecutablefile,andrequires s pecificactivation,whichm ayincludeus er
actions oratim ebas edevent.Whenactivated,avirus caninfectthefiles ithas notyetinfected,butdoes notautom aticallypropagateits elfto
others ys tem s .Selfpropagationis afeatureofworm s .Inadditiontobeingdis tributedovertheInternet,virus es areals os preadbyUSB
m em orys ticks ,CDs ,andDVDs .

Pregunta12

2/2pts

HowdoesaDoSattacktakeadvantageofthestatefulconditionoftargetsystems?

byexecutingcodethatcorrupts ordeletes s ys tem files


bycontinuous lys endingpackets ofunexpecteds izeorunexpecteddata
byus ingadictionaryofpas s words toattem pttoacces s thes ys tem
byinterceptingandanalyzingorm anipulatingdataas itis s entacros s thenetwork

Refertocurriculum topic:1.2.4
Adictionaryofpas s words is us edbyabruteforcepas s wordattack.Virus es andotherm alwareexecutecodethatcorrupts ordeletes
s ys tem files .Am aninthem iddleattackintercepts andanalyzes orm anipulates dataas itis s entacros s thenetwork.

Pregunta13

2/2pts

Whatishyperjacking?

takingoveravirtualm achinehypervis oras partofadatacenterattack


overclockingthem es hnetworkwhichconnects thedatacenters ervers
addingoutdateds ecuritys oftwaretoavirtualm achinetogainacces s toadatacenters erver
us ingproces s ors from m ultiplecom puters toincreas edataproces s ingpower

Refertocurriculum topic:1.1.2
Hyperjackingoccurs whenanattackerhijacks avirtualm achine(VM)hypervis orandthenus es thatVMtolaunchanattackonotherdata
centerdevices .

Pregunta14

2/2pts

TrueorFalse?
Antivirussoftwarecanpreventvirusesfromenteringthenetwork.

true
fals e

Refertocurriculum topic:1.3.4
Althoughantivirus s oftwareis theprim arym eans ofm itigatingvirus es andTrojanhors es ,itcannotpreventvirus es from enteringthe
network.

https://1375232.netacad.com/courses/382814/quizzes/2957131

5/6

15/6/2016

Chapter1Quiz:CCNAS2016

Pregunta15

2/2pts

WhatfunctionalareaoftheCiscoNetworkFoundationProtectionframeworkusesprotocolssuchasTelnetandSSHtomanagenetwork
devices?

dataplane
m anagem entplane
controlplane
forwardingplane

Refertocurriculum topic:1.3.5
Therearethreefunctionalareas oftheCis coNetworkFoundationProtection(NFP)fram ework:
Controlplane:Res pons ibleforroutingfunctions .Cons is ts ofthetrafficgeneratedbynetworkdevices tooperatethenetwork
Managem entplane:Res pons ibleform anagingnetworkdevices
Data(Forwarding)plane:Res pons ibleforforwardingus erdata

https://1375232.netacad.com/courses/382814/quizzes/2957131

6/6

You might also like