Search Header Logo

Cisco Attacks

Authored by Pei Zhang

Computers

10th Grade

Used 3+ times

Cisco Attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is a Malware that holds a computer system captive until a payment is made to the attacker?

Spyware

Adware

Ransomeware

Virus

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the most common goal of search engine optimization (SEO) poisoning?

To trick someone into installing malware or divulging personal information

To overwhelm a network device with maliciously formed packets

To build a botnet of zombies

To increase web traffic to malicious sites

3.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

A set of changes done to any program or application with the aim of updating, fixing or improving it is what?

A fix

A hack

An install

A patch

4.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following should be carried out to address known software vulnerabilities of a specific application?

Change the hardware

Change the software

Remove the application

Install a security patch

5.

MULTIPLE SELECT QUESTION

20 sec • 3 pts

Which of the following characteristics describe a worm? (Choose Two)

Infects computers by attaching to software code

Hides in a dormant state until needed by an attacker

Travels to new computers without any intervention or knowledge of the user

Is self-replicating

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which statement about the operation of a standard ACL is incorrect?

The router extracts the source IPv4 address from the packet header.

Router starts at top of ACL and compares address to each ACE sequentially

When a match is made, the ACE either permits or denies the packet

If there are no matching ACEs in the ACL, the packet is forwarded

7.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following is an ACL best practice?

Always test ACLs on a production network.

Create your ACLs on a production router.

Document the ACLs using the description ACL command.

Write the ACL before configuring it on a router.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?