Capitulo 1 Ccna Security PDF
Capitulo 1 Ccna Security PDF
attempting to write more data to a memory location than that location can hold
sending too much information to two or more interfaces of the same device, thereby causing dropped packets
sending repeated connections such as Telnet to a particular device, thus denying other data sources
2 What are the three major components of a worm attack? (Choose three.)
an enabling vulnerability
an infecting vulnerability
a payload
a penetration mechanism
a probing mechanism
a propagation mechanism
port redirection
reconnaissance
trust exploitation
4 An attacker is using a laptop as a rogue access point to capture all network traffic from
targeted user. Which type of attack is this?
trust exploitation
buffer overflow
port redirection
5 Which two statements characterize DoS attacks? (Choose two.)
They always precede access attacks.
They are difficult to conduct and are initiated only by very skilled attackers.
6 Which two network security solutions can be used to mitigate DoS attacks? (Choos
virus scanning
data encryption
antispoofing technologies
7 What are the three core components of the Cisco Secure Data Center solution? (Cho
three.)
servers
visibility
infrastructure
mesh network
threat defense
secure segmentation
8 Which condition describes the potential threat created by Instant On in a data center?
when the primary IPS appliance is malfunctioning
when a VM that may have outdated security policies is brought online after a long period of inactivity
when an attacker hijacks a VM hypervisor and then launches attacks against other devices in the data center
9 What functional area of the Cisco Network Foundation Protection framework is res
for device-generated packets required for network operation, such as ARP messag
exchanges and routing advertisements?
control plane
management plane
data plane
forwarding plane
integrity
availability
authorization
threat prevention
countermeasures
inoculation
treatment
containment
14 What role does the Security Intelligence Operations (SIO) play in the Cisco SecureX
architecture?
identifying and stopping malicious traffic
authenticating users
identifying applications
enforcing policy
Early Internet users often engaged in activities that would harm other users.
Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.
financial gain
political reasons
to gain attention
18 What is the significant characteristic of worm malware?
Worm malware disguises itself as legitimate software.
An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
Too much information is destined for a particular memory block, causing additional memory areas to be affected.
a software application that enables the capture of all network packets that are sent across a LAN.
a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services.
a query and response protocol that identifies information about a domain, including the addresses that are assigned to that
Password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.
Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execu
malicious code.
To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers on a host.
Trust exploitation attacks often involve the use of a laptop to act as a rogue access point to capture and copy all network tr
public location, such as a wireless hotspot.
23 How is a smurf attack conducted?
by sending a large number of packets to overflow the allocated buffer memory of the target device
by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytes
by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same
by sending a large number of TCP SYN packets to a target device from a spoofed source address
24
Fill in the blank.
prevention
As a dedicated network security tool, an intrusion system can provide detectio
blocking of attacks in real time.