Cisco Attacks

Cisco Attacks

10th Grade

26 Qs

quiz-placeholder

Similar activities

K-Jarkom-BSI

K-Jarkom-BSI

University

30 Qs

Вопросы об ACL и ААА

Вопросы об ACL и ААА

University

25 Qs

Interconexión de Redes U3

Interconexión de Redes U3

University

21 Qs

Konfigurasi vlan

Konfigurasi vlan

11th Grade

25 Qs

Test Spv

Test Spv

11th Grade

25 Qs

Perancangan dan pengalamatan Jaringan

Perancangan dan pengalamatan Jaringan

11th Grade

21 Qs

PAS 2021b, AIJ XI TKJ

PAS 2021b, AIJ XI TKJ

12th Grade

25 Qs

SOAL LATIHAN PRODUKTIF TKJ KELAS 11

SOAL LATIHAN PRODUKTIF TKJ KELAS 11

11th Grade

25 Qs

Cisco Attacks

Cisco Attacks

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Pei Zhang

Used 3+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is a Malware that holds a computer system captive until a payment is made to the attacker?

Spyware

Adware

Ransomeware

Virus

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the most common goal of search engine optimization (SEO) poisoning?

To trick someone into installing malware or divulging personal information

To overwhelm a network device with maliciously formed packets

To build a botnet of zombies

To increase web traffic to malicious sites

3.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

A set of changes done to any program or application with the aim of updating, fixing or improving it is what?

A fix

A hack

An install

A patch

4.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following should be carried out to address known software vulnerabilities of a specific application?

Change the hardware

Change the software

Remove the application

Install a security patch

5.

MULTIPLE SELECT QUESTION

20 sec • 3 pts

Which of the following characteristics describe a worm? (Choose Two)

Infects computers by attaching to software code

Hides in a dormant state until needed by an attacker

Travels to new computers without any intervention or knowledge of the user

Is self-replicating

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which statement about the operation of a standard ACL is incorrect?

The router extracts the source IPv4 address from the packet header.

Router starts at top of ACL and compares address to each ACE sequentially

When a match is made, the ACE either permits or denies the packet

If there are no matching ACEs in the ACL, the packet is forwarded

7.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following is an ACL best practice?

Always test ACLs on a production network.

Create your ACLs on a production router.

Document the ACLs using the description ACL command.

Write the ACL before configuring it on a router.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?