Cisco Attacks

Cisco Attacks

10th Grade

26 Qs

quiz-placeholder

Similar activities

UH Jaringan Komputer

UH Jaringan Komputer

10th Grade

25 Qs

K-Jarkom-BSI

K-Jarkom-BSI

University

30 Qs

Вопросы об ACL и ААА

Вопросы об ACL и ААА

University

25 Qs

PTS AIJ GANJIL 2021

PTS AIJ GANJIL 2021

11th Grade

25 Qs

TJBL

TJBL

11th Grade

25 Qs

EXAMEN FINAL DE EE467M y N

EXAMEN FINAL DE EE467M y N

University

27 Qs

Perancangan dan pengalamatan Jaringan

Perancangan dan pengalamatan Jaringan

11th Grade

21 Qs

CCNA 3A Final 5-8

CCNA 3A Final 5-8

University

30 Qs

Cisco Attacks

Cisco Attacks

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Pei Zhang

Used 3+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is a Malware that holds a computer system captive until a payment is made to the attacker?

Spyware

Adware

Ransomeware

Virus

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the most common goal of search engine optimization (SEO) poisoning?

To trick someone into installing malware or divulging personal information

To overwhelm a network device with maliciously formed packets

To build a botnet of zombies

To increase web traffic to malicious sites

3.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

A set of changes done to any program or application with the aim of updating, fixing or improving it is what?

A fix

A hack

An install

A patch

4.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following should be carried out to address known software vulnerabilities of a specific application?

Change the hardware

Change the software

Remove the application

Install a security patch

5.

MULTIPLE SELECT QUESTION

20 sec • 3 pts

Which of the following characteristics describe a worm? (Choose Two)

Infects computers by attaching to software code

Hides in a dormant state until needed by an attacker

Travels to new computers without any intervention or knowledge of the user

Is self-replicating

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which statement about the operation of a standard ACL is incorrect?

The router extracts the source IPv4 address from the packet header.

Router starts at top of ACL and compares address to each ACE sequentially

When a match is made, the ACE either permits or denies the packet

If there are no matching ACEs in the ACL, the packet is forwarded

7.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following is an ACL best practice?

Always test ACLs on a production network.

Create your ACLs on a production router.

Document the ACLs using the description ACL command.

Write the ACL before configuring it on a router.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?