chapter 1 quiz_ ccnas 2016

Upload: morpheo

Post on 02-Mar-2018

256 views

Category:

Documents


2 download

TRANSCRIPT

  • 7/26/2019 Chapter 1 Quiz_ CCNAS 2016

    1/6

    15/6/2016 Chapter 1 Quiz: CCNAS 2016

    https://1375232.netacad.com/courses/382814/quizzes/2957131 1/6

    Chapter 1 Quiz

    Fecha lmite No hay fecha de vencimiento Puntos 30 Preguntas15 Tiempo lmite 60 minutos Intentos permitidos 3

    Instrucciones

    Historial de intentos

    Intento Tiempo Calificacin

    EL LTIMO Intento 1 30 minutos 14 de 30

    Las respuestas correctas estn ocultas.

    Enviado 14 Jun en 21:32

    This quiz covers the content in CCNA Security: Impleme nting Network Security 2.0 Chapter 1. It is designed to provide an additional opportunity to practice the skills and knowledg

    presented in the chapter and to prepare for the Chapter Exam. You will be allowed multiple attempts and the grade does not appear in the gradebook.

    There are multiple task types that may be available in this quiz. Rather than having static graphics to view, some items may require you to open a PT activityand perform some

    investigation and configuration of devices before answering the question.

    NOTE: There are some small differences in how the questions score and operate in the Quiz and how they score and operate in the Chapter Exam. Quizzes allow for partial credit

    scoring on all item types to foster learning. Points on quizzes can also be deducted for answering incorrectly.This does not occur with the Chapter Exam.

    Form 30526

    Volver a realizar la evaluacin

    2 / 2 ptsPregunta 1

    What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

    to scan for accessibility

    to gather information about the network and devices

    Refer to curriculum topic: 1.2.4

    Gathering information about a network and scanning for access is a reconnaissance attack. Preventing other users from accessing a

    system is a denial of service attack. Attempting to retrieve and modify data, and attempting to escalate access privileges are types of access

    attacks.

    2 / 2 ptsPregunta 2

    Which statement describes phone freaking?

    A hacke r m im ics a to ne us ing a w his tle to m ake free long- dis tance calls on an analo g te leph one netwo rk.

    https://1375232.netacad.com/courses/382814/quizzes/2957131/take?user_id=1586735https://1375232.netacad.com/courses/382814/quizzes/2957131/history?version=1
  • 7/26/2019 Chapter 1 Quiz_ CCNAS 2016

    2/6

    15/6/2016 Chapter 1 Quiz: CCNAS 2016

    https://1375232.netacad.com/courses/382814/quizzes/2957131 2/6

    Refer to curriculum topic: 1.2.1

    The reason phone phreaking worked was because AT&T introduced digital phone switches to their network. These switches used various

    tones or tone dialing, to perform functions such as dialing or call termination. Today voice over IP (VoIP) calls can be hacked by sniffing the

    network.

    0 / 2 ptsPregunta 3Incorrecto

    Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network attacks?

    zone-based policy firewall

    Refer to curriculum topic: 1.1.1

    The Cisco Security Intelligence Operations (SIO) arrived in 2010 and is a cloud-based service that connects global threat information,

    reputation-based services, and sophisticated analysis to Cisco network security devices to provide stronger protection with faster response

    times.

    0 / 2 ptsPregunta 4Incorrecto

    What type of malware has the primary objective of spreading across the network?

    virus

    Refer to curriculum topic: 1.2.3

    The main purpos e of a worm is to self-replicate and propagate across the network. A virus is a type of malicious s oftware that needs a us er

    to spread. A trojan horse is not self-replicating and dis guises itself as a legitim ate application when it is not. A botnet is a series of zombie

    computers working together to wage a network attack.

    0 / 2 ptsPregunta 5

    Respuesta 1:

    Incorrecto

    Fill in the blank.

    The Cisco Network Foundation Protection framework has three functional areas. The Management plane of a router is responsible

    for routing packets correctly.

    Management

  • 7/26/2019 Chapter 1 Quiz_ CCNAS 2016

    3/6

    15/6/2016 Chapter 1 Quiz: CCNAS 2016

    https://1375232.netacad.com/courses/382814/quizzes/2957131 3/6

    Refer to curriculum topic: 1.3.5

    The data plane of a router is responsible for routing traffic. The other two planes defined by the Cisco Network Foundation Protection (NFP)

    framework are the control plane and the management plane.

    0 / 2 ptsPregunta 6Incorrecto

    What is the meaning of the principle of minimum trust when used to design network security?

    All netw ork and interne twork data com mu nicati ons sh ould be encrypted.

    Refer to curriculum topic: 1.3.4

    The principle of minimum trust means that network systems should not access and use one another unnecessarily and unconditionally.

    The other options are valid network security access protections but do not relate to the principle of minimum trust.

    2 / 2 ptsPregunta 7

    What is the primary means for mitigating virus and Trojan horse attacks?

    antivirus software

    Refer to curriculum topic: 1.3.4

    Antivirus so ftware is the p rim ary m eans of m itigati ng both virus and Trojan hors e a ttacks . By us ing up-to-da te a ntivirus so ftware, the sp read

    of viruses and Trojan horse attacks can be reduced.

    0 / 2 ptsPregunta 8Incorrecto

    Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a

    reason that computers are displaying these random graphics?

    The computers are subject to a reconnaissance attack.

  • 7/26/2019 Chapter 1 Quiz_ CCNAS 2016

    4/6

    15/6/2016 Chapter 1 Quiz: CCNAS 2016

    https://1375232.netacad.com/courses/382814/quizzes/2957131 4/6

    Refer to curriculum topic: 1.2.3

    A virus su ch as this is harm les s, but stil l n eeds to b e re mo ved. Other viruse s can be des tructive in that th ey m odify or dele te fil es on the

    local computer and possibly other computers on the network.

    0 / 2 ptsPregunta 9Incorrecto

    Which security measure is typically found both inside and outside a data center facility?

    a gate

    Refer to curriculum topic: 1.1.2

    Continuous video surveillance is a se curity meas ure found both inside and ou tside a data center facility. A gate provides outside perim eter

    security. Security traps, biometrics access , and exit sens ors provide inside perim eter security.

    0 / 2 ptsPregunta 10Incorrecto

    What is a main purpose of launching an access attack on network systems?

    to scan for accessible networks

    Refer to curriculum topic: 1.2.4

    Gathering information about a network and scanning for access is a reconnaissance attack. Preventing other users from accessing a

    system is a denial of service attack.

    0 / 2 ptsPregunta 11Incorrecto

    What is a significant characteristic of virus malware?

    Once installed on a host system, a virus will automatically propagate itself to other systems.

  • 7/26/2019 Chapter 1 Quiz_ CCNAS 2016

    5/6

    15/6/2016 Chapter 1 Quiz: CCNAS 2016

    https://1375232.netacad.com/courses/382814/quizzes/2957131 5/6

    Refer to curriculum topic: 1.2.3

    A virus is ma licio us code that i s attache d to a l egitim ate p rogram or e xecutable file, and requi res sp ecific activation, which ma y incl ude us er

    actions or a time-based event. When activated, a virus can infect the files it has not yet infected, but does not automatically propagate itself to

    other systems. Self-propagation is a feature of worms. In addition to being distributed over the Internet, viruses are also spread by USB

    memory sticks, CDs, and DVDs.

    2 / 2 ptsPregunta 12

    How does a DoS attack take advantage of the stateful condition of target systems?

    by continuously sending packets of unexpected size or unexpected data

    Refer to curriculum topic: 1.2.4

    A dictio nary of pas sw ords is us ed by a brute force pas sw ord attack. Viruses and other ma lware execute code that c orrupts or d elete s

    system files. A man-in-the-middle attack intercepts and analyzes or manipulates data as it is sent across the network.

    2 / 2 ptsPregunta 13

    What is hyperjacking?

    taking over a virtual machine hypervisor as part of a data center attack

    Refer to curriculum topic: 1.1.2

    Hyperjacking occurs when an attacker hijacks a virtual machine (VM) hypervisor and then uses that VM to launch an attack on other data

    center devices.

    2 / 2 ptsPregunta 14

    True or False?

    Antivirus software can prevent viruses from entering the network.

    false

    Refer to curriculum topic: 1.3.4

    Although antivirus so ftware is the p rim ary m eans of m itigati ng viruse s and Trojan hors es , it canno t prevent viruse s from enterin g th e

    network.

  • 7/26/2019 Chapter 1 Quiz_ CCNAS 2016

    6/6

    15/6/2016 Chapter 1 Quiz: CCNAS 2016

    https://1375232.netacad.com/courses/382814/quizzes/2957131 6/6

    2 / 2 ptsPregunta 15

    What functional area of the Cisco Network Foundation Protection framework uses protocols such as Telnet and SSH to manage network

    devices?

    management plane

    Refer to curriculum topic: 1.3.5

    There are three functional areas of the Cisco Network Foundation Protection (NFP) framework:

    Control plane: Responsible for routing functions. Consists of the traffic generated by network devices to operate the network

    Management plane: Responsible for managing network devices

    Data (Forwarding) plane: Responsible for forwarding user data