Class Activity 01 (Multiple Choice Questions)
Class Activity 01 (Multiple Choice Questions)
Answer: D
What are the three major components of a worm attack? (Choose three.)
a) a penetration mechanism
b) an infecting vulnerability
c) a payload
d) an enabling vulnerability
e) a probing mechanism
f) a propagation mechanism
Answer: A,C,F
a) Internal threats can cause even greater damage than external threats.
b) Threats have become less sophisticated while the technical knowledge needed
by an attacker has grown.
c) Early Internet users often engaged in activities that would harm other users.
Answer: A
What causes a buffer overflow?
d) attempting to write more data to a memory location than that location can hold
e) sending too much information to two or more interfaces of the same device,
thereby causing dropped packets
Answer: D
b) fame seeking
c) financial gain
d) political reasons
Answer: C
Which two network security solutions can be used to mitigate DoS attacks?
(Choose two.)
a) virus scanning
d) antispoofing technologies
e) data encryption
Answer: B,D
Which two statements characterize DoS attacks? (Choose two.)
c) They are difficult to conduct and are initiated only by very skilled attackers.
Answer: A,B
a) data plane
b) control plane
c) management plane
d) forwarding plane
Answer: B
a) threat prevention
b) authorization
c) confidentiality
d) countermeasures
e) integrity
f) availability
Answer: C,E,F
What is the primary method for mitigating malware?
Answer: B
c) to gain attention
Answer: E
What role does the Security Intelligence Operations (SIO) play in the Cisco SecureX
architecture?
b) authenticating users
c) enforcing policy
d) identifying applications
Answer: A
What worm mitigation phase involves actively disinfecting infected systems?
a) Treatment
b) containment
c) inoculation
d) quarantine
Answer: A
c) by sending a large number of TCP SYN packets to a target device from a spoofed
source address
d) by sending an echo request in an IP packet larger than the maximum packet size
of 65,535 bytes
Answer: B
Answer: A
What is the first step in the risk management process specified by the ISO/IEC?
Answer: C
Answer: A
d) when a VM that may have outdated security policies is brought online after a long
period of inactivity
Answer: D
What are the three core components of the Cisco Secure Data Center solution?
(Choose three.)
a) mesh network
b) secure segmentation
c) visibility
d) threat defense
e) servers
f) infrastructure
Answer: B,C,D
a) trust exploitation
b) denial of service
c) reconnaissance
d) port redirection
Answer: C
Answer: C
Which two statements describe access attacks? (Choose two.)
a) Trust exploitation attacks often involve the use of a laptop to act as a rogue
access point to capture and copy all network traffic in a public location, such as
a wireless hotspot.
b) To detect listening services, port scanning attacks scan a range of TCP or UDP
port numbers on a host
c) Buffer overflow attacks write data beyond the hallocated buffer memory to
overwrite valid data or to exploit systems to execute malicious code.
Answer: A
b) a software application that enables the capture of all network packets that are
sent across a LAN.
Answer:D