Cisco Exam Answers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

1. What type of attack does zombies use?

DDoS

2. A medical office employee emails patients about facility visits and


recent patient inquiries. What information would place patient privacy
at risk if included in the email?

Patient records

3. What is the best method to avoid getting spyware on a machine?

Install software only from trusted websites.

4. What is the best approach to prevent a compromised IoT device


from maliciously accessing data and devices on a local network?

Place all IoT devices with Internet access on an isolated network.

5. The IT department reports that a company web server is receiving


an abnormally large number of web page requests from different
locations simultaneously. What type of security attack is occurring ?

DDoS

6. When describing malware, what is the difference between a virus


and a worm?

A virus replicates by attaching itself to another file, while a worm can


replicate independently.

7. Which of the following statements describes cybersecurity?

It is an ongoing effort to protect Internet-connected systems and the data


associated with those systems from damage or unauthorized use.

8. A company experiences overwhelming visits to a primary web


server. The IT department is developing a plan to add a couple more
web servers for load balancing and redundancy. What cybersecurity
requirement is addressed in the implementation of the plan?
Availability

9. What are the two goals of ensuring data integrity? (Choose two
options).

Data is not altered during transit.

Unauthorized entities cannot modify the data.

10. Why would a network administrator use the Nmap tool?

To detect and identify open ports.

11. What actions will an IDS take when detecting malicious traffic?

Create a network alert and log the detection.

12. A web server administrator configures access settings so that


users authenticate first before accessing certain websites. What
cybersecurity requirement is addressed in the configuration?

Confidentiality

13. What is the main objective of a cyber war?

Gain advantage over adversaries.

14. What is an example of a cyber kill chain?

A planned cyber attack process.

15. Which stage of the kill chain used by attackers focuses on target
identification and selection?

Recognition

16. True or false?


An employee does something as a representative of the company
knowing that the company and the action are considered illegal. The
company will be legally responsible for this action.

TRUE
17. What is the primary function of the Cisco Security Incident
Response Team?

Protect the company, the system and the preservation of data.

18. What are two security implementations that use biometric


technology? (Choose two options).

Speech recognition

Fingerprints

19. What tool is used to lure an attacker so that an administrator can


capture, record, and analyze attack behavior?

Trap (honeypot)

20. What technology creates a security token that allows a user to log
in to a desired web application using credentials from a social
network?

Open Authorization

21. Which two tools used for incident detection can be used to detect
anomalous behavior, command and control traffic, and infected hosts?
(Choose two options).

NetFlow

Intrusion detection system

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy