cisco网络安全答案1

更新时间:2023-05-07 17:28:49 阅读: 评论:0

1.What is a ping sweep?
A ping sweep is a network scanning technique that indicates the live hosts in a range of IP address.
A ping sweep is a software application that enables the capture of all network packets nt across a LAN.
A ping sweep is a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening r
A ping sweep is a query and respon protocol that identifies information about a domain, including the address assigne
domain.
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
2 points for Option 1
0 points for any other
option
2    2
2
Which access attack method involves a software program attempting to discover a system password by using an electronic dict buffer overflow attack
port redirection attack
Denial of Service attack
brute-force attack
IP spoofing attack
packet sniffer attack
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
2 points for Option 4
0 points for any other
option
2 0
3
How is a Smurf attack conducted?
by nding a large number of packets, overflowing the allocated buffer memory of the target device
by nding an echo request in an IP packet larger than the maximum packet size of 65,535 bytes
by nding a large number of ICMP requests to directed broadcast address from a spoofed source address on the sam by nding a large number of TCP SYN packets to a target device from a spoofed source address
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
2 points for Option 3
0 points for any other
option
2    2
4
A port scan is classified as what type of attack?
access attack
Denial of Service attack
reconnaissance attack
spoofing attack
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
2 points for Option 3
0 points for any other
option
2 0
5
What are the basic phas of attack that can be ud by a virus or worm in quential order?
paralyze, probe, penetrate, persist, and propagate
probe, penetrate, persist, propagate, and paralyze
penetrate, persist, propagate, paralyze, and probe
persist, propagate, paralyze, probe, and penetrate
Obrvable
Description
Max
Value
Earned
Value
1 correctness of
respon
2 points for Option 2
0 points for any other
option
2 0
6
What are the three major components of a worm attack? (Choo three.)  enabling vulnerability
infecting vulnerability
payload
penetration mechanism
probing mechanism
propagation mechanism
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
Option 1, Option 3, and Option 6
are correct.
1 point for each correct option.
0 points if more options are
lected than required.
3    1
7
Which type of software typically us a network adapter card in promiscuous mode to capture all network packets that are nt a port scanner
ping sweeper
packet sniffer
Internet information query
Obrvable
Description
Max Value
Earned Value
1
correctness of respon
2 points for Option
3 0 points for any other option
2
8
An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted ur. Which type of attack i
trust exploitation
buffer overflow
man in the middle
port redirection
Obrvable
Description
Max Value
Earned Value
1
correctness of respon
2 points for Option
3 0 points for any other option
2
9
Which three options describe the phas of worm mitigation? (Choo three.)
The containment pha requires the u of incoming and outgoing ACLs on routers and firewalls.
The containment pha tracks down and identifies the infected machines within the contained areas.
The inoculation pha disconnects, blocks, or removes infected machines.
The inoculation pha patches uninfected systems with the appropriate vendor patch for the vulnerability.  The quarantine pha terminates the worm process, removes modified files or system ttings, and patches the vulnera ud to exploit the system.
The treatment pha disinfects actively infected systems.
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
Option 1, Option 4, and Option 6
are correct.
1 point for each correct option.
0 points if more options are
lected than required.
3    1
10
Which pha of worm mitigation requires compartmentalization and gmentation of the network to slow down or stop the wor currently infected hosts from targeting and infecting other systems?
containment pha
inoculation pha
quarantine pha
treatment pha
Obrvable Description
Max
Value
Earned
Value
1 correctness of
respon
2 points for Option 1
0 points for any other
option
2 0
11
What is a characteristic of a Trojan Hor?
A Trojan Hor can be carried in a virus or worm.
A proxy Trojan Hor opens port 21 on the target system.
An FTP Trojan Hor stops anti-virus programs or firewalls from functioning.
A Trojan Hor can be hard to detect becau it clos when the application that launched it clos.

本文发布于:2023-05-07 17:28:49,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/89/866425.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图