Cisco CCNA Security Chapter 1 Exam Answer 100% 2014



CCNA Security - Chapter 1 Exam Answers


1. What are the basic phases of attack that can be used by a virus or worm in sequential order?

Answer:

* probe, penetrate, persist, propagate, and paralyze

 

2. Which two are characteristics of DoS attacks? (Choose two.)

Answer:

* They attempt to compromise the availability of a network, host, or application.

* Examples include smurf attacks and ping of death attacks.

 

3. Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?

Answer:

* A virus has infected the computers.

 

4. What are three types of access attacks? (Choose three.)

Answer:

* buffer overflow.

* port redirection.

* trust exploitation.

 

5. What occurs during a spoofing attack?

Answer:

One device falsifies data to gain access to privileged information.

 


6. What is a characteristic of a Trojan Horse?

Answer:

* A Trojan Horse can be carried in a virus or worm.

 

7. Which phase of worm mitigation requires compartmentalization and segmentation of the network to slow down or stop the worm and prevent currently infected hosts from targeting and infecting other systems?

Answer:

* containment phase

 

8. Which two statements are characteristics of a virus? (Choose two.)

Answer:

* A virus typically requires end-user activation.

* A virus can be dormant and then activate at a specific time or date.

 

9. What is a ping sweep?

Answer:

* A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.

 

10. Which type of security threat can be described as software that attaches to another program to execute a specific unwanted function?

Answer:

* virus

 

11. A disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?

Answer:

* reconnaissance

 

12. What occurs during the persist phase of a worm attack?

Answer:

* modification of system files and registry settings to ensure that the attack code is running.

 

13. What are the three major components of a worm attack? (Choose three.)

Answer:

* enabling vulnerability.

* payload.

* propagation mechanism.

 

14. A network administrator detects unknown sessions involving port 21 on the network. What could be causing this security breach?

Answer:

* An FTP Trojan Horse is executing.

 

15. What are three goals of a port scan attack? (Choose three.)

Answer:

* determine potential vulnerabilities.

* identify active services.

* identify operating systems.

 

16. How is a Smurf attack conducted?

Answer:

* by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network.

 

17. Which access attack method involves a software program attempting to discover a system password by using an electronic dictionary?

Answer:

* brute-force attack.

 

18. Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)

Answer:

* anti-spoofing technologies.

* intrusion protection systems.

 

19. Which phase of worm mitigation involves terminating the worm process, removing modified files or system settings that the worm introduced, and patching the vulnerability that the worm used to exploit the system?

Answer:

* treatment.

 

20. Which characteristic best describes the network security Compliance domain as specified by the ISO/IEC?

Answer:

* the process of ensuring conformance with security information policies, standards, and regulations.

 

21. Which statement describes phone freaking?

Answer:

* A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.

 

22. Which two statements describe access attacks? (Choose two.)

Answer:

Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers.

Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or exploit systems to execute malicious code.


Source : http://ccna-exam-answers-final.blogspot.com/2013/08/ccna-security-chapter-1-exam-answers.html
blog.ceaster.com - www.ceaster.com Ceaster Corp