
Cisco Attacks
Authored by Pei Zhang
Computers
10th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 5 pts
What is a Malware that holds a computer system captive until a payment is made to the attacker?
Spyware
Adware
Ransomeware
Virus
2.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
What is the most common goal of search engine optimization (SEO) poisoning?
To trick someone into installing malware or divulging personal information
To overwhelm a network device with maliciously formed packets
To build a botnet of zombies
To increase web traffic to malicious sites
3.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
A set of changes done to any program or application with the aim of updating, fixing or improving it is what?
A fix
A hack
An install
A patch
4.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
Which of the following should be carried out to address known software vulnerabilities of a specific application?
Change the hardware
Change the software
Remove the application
Install a security patch
5.
MULTIPLE SELECT QUESTION
20 sec • 3 pts
Which of the following characteristics describe a worm? (Choose Two)
Infects computers by attaching to software code
Hides in a dormant state until needed by an attacker
Travels to new computers without any intervention or knowledge of the user
Is self-replicating
6.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
Which statement about the operation of a standard ACL is incorrect?
The router extracts the source IPv4 address from the packet header.
Router starts at top of ACL and compares address to each ACE sequentially
When a match is made, the ACE either permits or denies the packet
If there are no matching ACEs in the ACL, the packet is forwarded
7.
MULTIPLE CHOICE QUESTION
10 sec • 3 pts
Which of the following is an ACL best practice?
Always test ACLs on a production network.
Create your ACLs on a production router.
Document the ACLs using the description ACL command.
Write the ACL before configuring it on a router.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?