You are on page 1of 6

10/13/2016 CCNASecurityChapter1Examv2CCNAExam2016

_ap_ufes{"success":true,"siteUrl":"ccna7.com","urls":{"Home":"https://ccna7.com","Category":"https://ccna7.com/category/ccna1v502
routingandswitching2015100/","Archive":"https://ccna7.com/2016/08/","Post":"https://ccna7.com/howtoinstallwindows
10/","Page":"https://ccna7.com/contact
us/","Attachment":"https://ccna7.com/ae/%d8%a7%d9%84%d8%a7%d8%ae%d8%aa%d8%a8%d8%a7%d8%b1
%d8%a7%d9%84%d9%86%d9%87%d8%a7%d8%a6%d9%8a%d9%84%d9%84%d8%af%d9%88%d8%b1%d8%a9
%d8%a7%d9%84%d8%aa%d8%af%d8%b1%d9%8a%d8%a8%d9%8a%d8%a9/%d9%84%d8%a7%d8%ae%d8%aa%d8%a8%d8%a7%
d8%b1%d8%a7%d9%84%d9%86%d9%87%d8%a7%d8%a6%d9%8a%d9%84%d9%84%d8%af%d9%88%d8%b1%d8%a9
%d8%a7%d9%84%d8%aa%d8%af%d8%b1%d9%8a%d8%a8%d9%8a%d8%a9q
002/","Nav_menu_item":"https://ccna7.com/3811/"}}_ap_ufee
CCNACourseware Microsoft LinuxEssentials IntroductiontoLinuxI IntroductiontoLinuxII About

Home ITE(ITEssentials) CCNA1 CCNA2 CCNA3 CCNA4 CCNASecurity CCNAPTLab2016

CCNASecurityChapter1Examv2
PostedonDecember11,2015byccna7 Search

CCNASecurityChapter1Examv2 FindUsonFacebook
1.Whatmethodcanbeusedtomitigatepingsweeps?
Categories
usingencryptedorhashedauthenticationprotocols
CCNA1v5.02RoutingandSwitching
installingantivirussoftwareonhosts
2015(100%)
deployingantisniffersoftwareonallnetworkdevices
CCNA1v5.1IntroductiontoNetworks
blockingICMPechoandechorepliesatthenetworkedge
CCNA1v5.1OnlineAssessement
2.Whatarethethreemajorcomponentsofawormattack?(Choose
CCNA2v5.02RoutingandSwitching
three.) 2015(100%)
apenetrationmechanism CCNA2V5.03RoutingandSwitching
aninfectingvulnerability Essentials
apayload CCNA3v5.02RoutingandSwitching
anenablingvulnerability 2015(100%)

https://ccna7.com/ccnasecurityexamanswerv2/ccnasecuritychapter1examv2/ 1/6
10/13/2016 CCNASecurityChapter1Examv2CCNAExam2016

aprobingmechanism CCNA3v5.03ScalingNetworks
apropagationmechanism CCNA4v5.02RoutingandSwitching
3.Whichstatementaccuratelycharacterizestheevolutionofthreatsto 2015(100%)
networksecurity? CCNA4v5.03ConnectingNetworks
CCNALabExam
Internalthreatscancauseevengreaterdamagethanexternalthreats.
CCNARoutingandSwitchingCourseware
Threatshavebecomelesssophisticatedwhilethetechnicalknowledgeneededbyan
CCNASecurityExamAnswerv1.2(100%)
attackerhasgrown.
CCNASecurityExamAnswerv2
EarlyInternetusersoftenengagedinactivitiesthatwouldharmotherusers.
CiscoLearning
Internetarchitectsplannedfornetworksecurityfromthebeginning.
ITEITEssentialsv6.0
4.Whatcausesabufferoverflow?
ITEv5.02Exam2015100%
launchingasecuritycountermeasuretomitigateaTrojanhorse LinuxEssentials(LPI010)
sendingrepeatedconnectionssuchasTelnettoaparticulardevice,thusdenyingother LPIC1101
datasources. LPIC1102
downloadingandinstallingtoomanysoftwareupdatesatonetime MicrosoftLearning
attemptingtowritemoredatatoamemorylocationthanthatlocationcanhold WindowTip
sendingtoomuchinformationtotwoormoreinterfacesofthesamedevice,thereby
causingdroppedpackets
5.Whatcommonlymotivatescybercriminalstoattacknetworksas
comparedtohactivistsorstatesponsoredhackers?
statusamongpeers
fameseeking
financialgain
politicalreasons
6.WhichtwonetworksecuritysolutionscanbeusedtomitigateDoS
attacks?(Choosetwo.)
virusscanning
intrusionprotectionsystems
applyinguserauthentication
antispoofingtechnologies
dataencryption
7.WhichtwostatementscharacterizeDoSattacks?(Choosetwo.)

Examplesincludesmurfattacksandpingofdeathattacks.

https://ccna7.com/ccnasecurityexamanswerv2/ccnasecuritychapter1examv2/ 2/6
10/13/2016 CCNASecurityChapter1Examv2CCNAExam2016

Theyattempttocompromisetheavailabilityofanetwork,host,orapplication
8.Anattackerisusingalaptopasarogueaccesspointtocaptureall
networktrafficfromatargeteduser.Whichtypeofattackisthis?
trustexploitation
bufferoverflow
maninthemiddle
portredirection
9.WhatfunctionalareaoftheCiscoNetworkFoundationProtection
frameworkisresponsiblefordevicegeneratedpacketsrequiredfor
networkoperation,suchasARPmessageexchangesandrouting
advertisements?
dataplane
controlplane
managementplane
forwardingplane
10.Whatarethethreecomponentsofinformationsecurityensuredby
cryptography?(Choosethree.)
threatprevention
authorization
confidentiality
countermeasures
integrity
availability
11. Whatistheprimarymethodformitigatingmalware?

usingencryptedorhashedauthenticationprotocols
installingantivirussoftwareonallhosts
blockingICMPechoandechorepliesatthenetworkedge
deployingintrusionpreventionsystemsthroughoutthenetwork
12.Whatisanobjectiveofastatesponsoredattack?

togainfinancialprosperity
toselloperationsystemvulnerabilitiestootherhackers
togainattention

https://ccna7.com/ccnasecurityexamanswerv2/ccnasecuritychapter1examv2/ 3/6
10/13/2016 CCNASecurityChapter1Examv2CCNAExam2016

torightaperceivedwrong
13.WhatroledoestheSecurityIntelligenceOperations(SIO)playinthe
CiscoSecureXarchitecture?
identifyingandstoppingmalicioustraffic
authenticatingusers
enforcingpolicy
identifyingapplications
14.Whatwormmitigationphaseinvolvesactivelydisinfectinginfected
systems?
Treatment
15.Howisasmurfattackconducted?

bysendingalargenumberofpacketstooverflowtheallocatedbuffermemoryofthe
targetdevice
bysendingalargenumberofICMPrequeststodirectedbroadcastaddressesfroma
spoofedsourceaddressonthesamenetwork
bysendingalargenumberofTCPSYNpacketstoatargetdevicefromaspoofed
sourceaddress
bysendinganechorequestinanIPpacketlargerthanthemaximumpacketsizeof
65,535bytes
16.WhatisacharacteristicofaTrojanhorseasitrelatestonetwork
security?
Malwareiscontainedinaseeminglylegitimateexecutableprogram.
Extremequantitiesofdataaresenttoaparticularnetworkdeviceinterface.
Anelectronicdictionaryisusedtoobtainapasswordtobeusedtoinfiltrateakey
networkdevice.
Toomuchinformationisdestinedforaparticularmemoryblockcausingadditional
memoryareastobeaffected.
17.Whatisthefirststepintheriskmanagementprocessspecifiedbythe
ISO/IEC?
Createasecuritypolicy.
Conductariskassessment.
InventoryandclassifyITassets.

https://ccna7.com/ccnasecurityexamanswerv2/ccnasecuritychapter1examv2/ 4/6
10/13/2016 CCNASecurityChapter1Examv2CCNAExam2016

Createasecuritygovernancemodel.
18.Whatisthesignificantcharacteristicofwormmalware?

Awormcanexecuteindependently
Awormmustbetriggeredbyaneventonthehostsystem.
Wormmalwaredisguisesitselfaslegitimatesoftware
Onceinstalledonahostsystem,awormdoesnotreplicateitself.
19.WhichconditiondescribesthepotentialthreatcreatedbyInstantOnin
adatacenter?
whentheprimaryfirewallinthedatacentercrashes
whenanattackerhijacksaVMhypervisorandthenlaunchesattacksagainstother
devicesinthedatacenter
whentheprimaryIPSapplianceismalfunctioning
whenaVMthatmayhaveoutdatedsecuritypoliciesisbroughtonlineafteralongperiod
ofinactivity.
20.WhatarethethreecorecomponentsoftheCiscoSecureDataCenter
solution?(Choosethree.)
meshnetwork
securesegmentation
visibility
threatdefense
servers
infrastructure
21.AdisgruntledemployeeisusingWiresharktodiscoveradministrative
Telnetusernamesandpasswords.Whattypeofnetworkattackdoes
thisdescribe?
trustexploitation
denialofservice
reconnaissance
portredirection
22.Whichtwostatementsdescribeaccessattacks?(Choosetwo.)

Trustexploitationattacksofteninvolvetheuseofalaptoptoactasarogueaccesspoint
tocaptureandcopyallnetworktrafficinapubliclocation,suchasawirelesshotspot.

https://ccna7.com/ccnasecurityexamanswerv2/ccnasecuritychapter1examv2/ 5/6
10/13/2016 CCNASecurityChapter1Examv2CCNAExam2016

Todetectlisteningservices,portscanningattacksscanarangeofTCPorUDPport
numbersonahost
Bufferoverflowattackswritedatabeyondthehallocatedbuffermemorytooverwritevalid
dataortoexploitsystemstoexecutemaliciouscode.
Passwordattackscanbeimplementedbytheuseosbruteforceattackmethods,Trojan
horse,orpacketsniffers.
Portredirectionattacksuseanetworkadaptercardinpromiscuousmodetocaptureall
networkpacketsthataresentacrossaLAN.
23.Whatisapingsweep?

ascanningtechniquethatexaminesarangeofTCPorUDPportnumbersonahostto
detectlisteningservices.
asoftwareapplicationthatenablesthecaptureofallnetworkpacketsthataresent
acrossaLAN.
aqueryandresponseprotocolthatidentifiesinformationaboutadomain,includingthe
addressesthatareassignedtothatdomain
anetworkscanningtechniquethatindicatesthelivehostsinarangeofIPaddresses.
24.Asadedicatednetworksecuritytool,anintrusionProtectionsystem
canprovidedetectionandblockingofattacksinrealtime.

Comments
comments

Home|CCNAExam ITE(ITEssentials) CCNA1 CCNA2 CCNA3 CCNA4

PoweredbyWordPressandHeatMapAdAptiveTheme

https://ccna7.com/ccnasecurityexamanswerv2/ccnasecuritychapter1examv2/ 6/6

You might also like