Cisco Attacks

Cisco Attacks

10th Grade

26 Qs

quiz-placeholder

Similar activities

N5 Computing Science:  Software Design

N5 Computing Science: Software Design

9th - 10th Grade

21 Qs

Quiz on Air Pool 1 SH

Quiz on Air Pool 1 SH

University

21 Qs

quiz perangkat jaringan komputer : andi ahmad rahmat ramadhan

quiz perangkat jaringan komputer : andi ahmad rahmat ramadhan

9th - 12th Grade

21 Qs

Examen final curso Internet Avanzado

Examen final curso Internet Avanzado

University

21 Qs

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

1st Grade - Professional Development

24 Qs

CIW Vocab 6

CIW Vocab 6

9th - 12th Grade

22 Qs

Technical Quiz - INSIGHT 2K23

Technical Quiz - INSIGHT 2K23

University

23 Qs

Java Review

Java Review

9th Grade - University

25 Qs

Cisco Attacks

Cisco Attacks

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Pei Zhang

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is a Malware that holds a computer system captive until a payment is made to the attacker?

Spyware

Adware

Ransomeware

Virus

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the most common goal of search engine optimization (SEO) poisoning?

To trick someone into installing malware or divulging personal information

To overwhelm a network device with maliciously formed packets

To build a botnet of zombies

To increase web traffic to malicious sites

3.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

A set of changes done to any program or application with the aim of updating, fixing or improving it is what?

A fix

A hack

An install

A patch

4.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following should be carried out to address known software vulnerabilities of a specific application?

Change the hardware

Change the software

Remove the application

Install a security patch

5.

MULTIPLE SELECT QUESTION

20 sec • 3 pts

Which of the following characteristics describe a worm? (Choose Two)

Infects computers by attaching to software code

Hides in a dormant state until needed by an attacker

Travels to new computers without any intervention or knowledge of the user

Is self-replicating

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which statement about the operation of a standard ACL is incorrect?

The router extracts the source IPv4 address from the packet header.

Router starts at top of ACL and compares address to each ACE sequentially

When a match is made, the ACE either permits or denies the packet

If there are no matching ACEs in the ACL, the packet is forwarded

7.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following is an ACL best practice?

Always test ACLs on a production network.

Create your ACLs on a production router.

Document the ACLs using the description ACL command.

Write the ACL before configuring it on a router.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?