10
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 1/10 Search my website ... You are here: Home / Cisco Associate / CCNA Security / CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% January 1, 2012 by HeiseR 0 Comments CCNAS Chapter 1 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2012 – 2013 1. What are the basic phases of attack that can be used by a virus or worm in sequential order? paralyze, probe, penetrate, persist, and propagate probe, penetrate, persist, propagate, and paralyze penetrate, persist, propagate, paralyze, and probe persist, propagate, paralyze, probe, and penetrate 2. Which two are characteristics of DoS attacks? Online Email Newsletter Sign up to receive email updates and to hear what's going on with my website! Enter your email address. Popular Posts ERouting Final Exam CCNA 2 4.0 2012 2013 100% DsmbISP Chapter 1 CCNA Discovery 2 4.1 2012 2013 100% DHomesb Final Exam CCNA Discovery 1 4.0 2012 2013 100% ENetwork Final Exam CCNA 1 4.0 2012 2013 100% ERouting Chapter 1 CCNA 2 4.0 2012 2013 100% Home Cisco Associate Cisco Professional Cisco Expert Virtualization Job Tool

CCNAS Chapter 1 CCNA Security 1

Embed Size (px)

DESCRIPTION

nice books for CCNA

Citation preview

Page 1: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 1/10

Search my website ...

You are here: Home / Cisco Associate / CCNA

Security / CCNAS Chapter 1 CCNA Security 1.0

2012 2013 100%

CCNAS Chapter 1 CCNA Security1.0 2012 2013 100%

January 1, 2012 by HeiseR 0 Comments

CCNAS Chapter 1 – CCNASecurity: ImplementingNetwork Security (Version1.0) – Answers – 2012 –2013

1. What are the basic phases of attack that can be

used by a virus or worm in sequential order?

paralyze, probe, penetrate, persist, and propagate

probe, penetrate, persist, propagate, and paralyze

penetrate, persist, propagate, paralyze, and probe

persist, propagate, paralyze, probe, and penetrate

2. Which two are characteristics of DoS attacks?

Online

Email Newsletter

Sign up to receive email

updates and

to hear what's going on with

my website!

Enter your email address...

Popular Posts

ERouting Final Exam CCNA 2

4.0 2012 2013 100%

DsmbISP Chapter 1 CCNA

Discovery 2 4.1 2012 2013

100%

DHomesb Final Exam CCNA

Discovery 1 4.0 2012 2013

100%

ENetwork Final Exam CCNA 1

4.0 2012 2013 100%

ERouting Chapter 1 CCNA 2

4.0 2012 2013 100%

Home Cisco Associate Cisco Professional Cisco Expert

Virtualization Job Tool

Page 2: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 2/10

(Choose two.)

They always precede access attacks.

They attempt to compromise the availability of a network,

host, or application.

They are difficult to conduct and are initiated only by very

skilled attackers.

They are commonly launched with a tool called

L0phtCrack.

Examples include smurf attacks and ping of death attacks.

3. Users report to the helpdesk that icons usually

seen on the menu bar are randomly appearing on

their computer screens. What could be a reason that

computers are displaying these random graphics?

An access attack has occurred.

A virus has infected the computers.

A DoS attack has been launched against the network.

The computers are subject to a reconnaissance attack.

4. What are three types of access attacks? (Choose

three.)

buffer overflow

ping sweep

port redirection

trust exploitation

port scan

Internet information query

5. What occurs during a spoofing attack?

One device falsifies data to gain access to privileged

information.

Large amounts of network traffic are sent to a target device

to make resources unavailable to intended users.

Improperly formatted packets are forwarded to a target

device to cause the target system to crash.

ERouting Chapter 3 CCNA 2

4.0 2012 2013 100%

ERouting Chapter 4 CCNA 2

4.0 2012 2013 100%

Cisco IOS Collection

(originally Internetwork

Operating System)

ENetwork Chapter 8 CCNA 1

4.0 2012 2013 100%

ENetwork Skill Exam CCNA 1

4.0 2012 2013 100%

Categories

Select Category

CCNAS 1.0 &CCNP 6.0 Answers

CCNAS ROUTESWITCHTSHOOT

1 1 1 1

2 2 2 2

3 3 3 3

4 4 4 4

5 5 5 5

6 6 6 6

7 7 7 7

8 8 8

9 9

Final Final Final Final

Sponsored

Page 3: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 3/10

A program writes data beyond the allocated memory to

enable the execution of malicious code.

6. What is a characteristic of a Trojan Horse?

A Trojan Horse can be carried in a virus or worm.

A proxy Trojan Horse opens port 21 on the target system.

An FTP Trojan Horse stops anti-virus programs or firewalls

from functioning.

A Trojan Horse can be hard to detect because it closes

when the application that launched it closes.

7. Which phase of worm mitigation requires

compartmentalization and segmentation of the

network to slow down or stop the worm and prevent

currently infected hosts from targeting and infecting

other systems?

containment phase

inoculation phase

quarantine phase

treatment phase

8. Which two statements are characteristics of a

virus? (Choose two.)

A virus typically requires end-user activation.

A virus has an enabling vulnerability, a propagation

mechanism, and a payload.

A virus replicates itself by independently exploiting

vulnerabilities in networks.

A virus provides the attacker with sensitive data, such as

passwords.

A virus can be dormant and then activate at a specific time

or date.

9. What is a ping sweep?

A ping sweep is a network scanning technique that

Page 4: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 4/10

indicates the live hosts in a range of IP addresses.

A ping sweep is a software application that enables the

capture of all network packets sent across a LAN.

A ping sweep is a scanning technique that examines a

range of TCP or UDP port numbers on a host to detect

listening services.

A ping sweep is a query and response protocol that

identifies information about a domain, including the

addresses assigned to that domain.

10. Which type of security threat can be described as

software that attaches to another program to execute

a specific unwanted function?

virus

worm

proxy Trojan horse

Denial of Service Trojan horse

11. A disgruntled employee is using Wireshark to

discover administrative Telnet usernames and

passwords. What type of network attack does this

describe?

Denial of Service

port redirection

reconnaissance

trust exploitation

12. What occurs during the persist phase of a worm

attack?

identification of vulnerable targets

modification of system files and registry settings to ensure

that the attack code is running

transfer of exploit code through an attack vector

extension of the attack to vulnerable neighboring targets

Page 5: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 5/10

13. What are the three major components of a worm

attack? (Choose three.)

enabling vulnerability

infecting vulnerability

payload

penetration mechanism

probing mechanism

propagation mechanism

14. A network administrator detects unknown

sessions involving port 21 on the network. What

could be causing this security breach?

An FTP Trojan Horse is executing.

A reconnaissance attack is occurring.

A denial of service attack is occurring.

Cisco Security Agent is testing the network.

15. What are three goals of a port scan attack?

(Choose three.)

disable used ports and services

determine potential vulnerabilities

identify active services

identify peripheral configurations

identify operating systems

discover system passwords

16. How is a Smurf attack conducted?

by sending a large number of packets, overflowing the

allocated buffer memory of the target device

by sending an echo request in an IP packet larger than the

maximum packet size of 65,535 bytes

by sending a large number of ICMP requests to directed

broadcast addresses from a spoofed source address on

the same network

by sending a large number of TCP SYN packets to a target

Page 6: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 6/10

device from a spoofed source address

17. Which access attack method involves a software

program attempting to discover a system password

by using an electronic dictionary?

buffer overflow attack

port redirection attack

Denial of Service attack

brute-force attack

IP spoofing attack

packet sniffer attack

18 Which two network security solutions can be used

to mitigate DoS attacks? (Choose two.)

virus scanning

data encryption

anti-spoofing technologies

intrusion protection systems

applying user authentication

19. Which phase of worm mitigation involves

terminating the worm process, removing modified

files or system settings that the worm introduced,

and patching the vulnerability that the worm used to

exploit the system?

containment

inoculation

quarantine

treatment

20. Which characteristic best describes the network

security Compliance domain as specified by the

ISO/IEC?

the integration of security into applications

an inventory and classification scheme for information

Page 7: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 7/10

Share this:

assets

the restriction of access rights to networks, systems,

applications, functions, and data

the process of ensuring conformance with security

information policies, standards, and regulations

21. Which statement describes phone freaking?

A hacker uses password-cracking programs to gain

access to a computer via a dialup account.

A hacker gains unauthorized access to networks via

wireless access points.

A hacker mimics a tone using a whistle to make free long-

distance calls on an analog telephone network.

A hacker uses a program that automatically scans

telephone numbers within a local area, dialing each one in

search of computers, bulletin board systems, and fax

machines.

22. Which two statements describe access attacks?

(Choose two.)

Port redirection attacks use a network adapter card in

promiscuous mode to capture all network packets that are

sent across a LAN.

Password attacks can be implemented using brute-force

attack methods, Trojan Horses, or packet sniffers.

Buffer overflow attacks write data beyond the allocated

buffer memory to overwrite valid data or exploit systems to

execute malicious code.

Port scanning attacks scan a range of TCP or UDP port

numbers on a host to detect listening services.

Trust exploitation attacks can use a laptop acting as a

rogue access point to capture and copy all network traffic

in a public location on a wireless hotspot.

Twitter Google +1 Facebook More

Page 8: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 8/10

Like this:

Be the first to like this.

Like

Related posts:

1. CCNAS Chapter 6 CCNA Security 1.0 2012 2013

100%

2. CCNAS Chapter 5 CCNA Security 1.0 2012 2013

100%

3. CCNAS Chapter 9 CCNA Security 1.0 2012 2013

100%

4. CCNAS Chapter 7 CCNA Security 1.0 2012 2013

100%

Filed Under: CCNA Security

Tagged With: Chapter 1

Page 9: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 9/10

0 comments

What's this?ALSO ON HEISER DEV ZONE

Passed CCNA exam

with 1000 points

10 months ago

DsmbISP Final Exam

CCNA Discovery 2 4.1

2012 100%3 comments • 10 months ago

Dex — cisco sucks.

DsmbISP Chapter 6

CCNA Discovery 2 4.1

2012 100%1 comment • 10 months ago

patrick — Its very useful

but i got 94.7%

ERouting Chapter 9

CCNA 2 4.0 2012 100%

1 comment • 10 months ago

disqus_ZFfpl6dPjc —

answer 10 (right answer

is 1 not 5) a query for

network

Leave a message...

Best ⚙ ⤤Share

No one has commented yet.

0★

Recent Posts

Cisco IOS 2691 Series

Modular Router

Cisco IOS Big Collection

Cisco IOS 1841 Series

Integrated Services Router

VMware Offline Demos Full

List

Cisco IOS Collection

Tags

Accessing the WAN

Chapter 1 Chapter 2

Chapter 3 Chapter 4

Chapter 5 Chapter 6

Chapter 8 Chapter 9 Final

Exam LAN Switching and

Wireless Network

Follow us

Facebook

Twitter

Google+

Feed / Atom / Feedburner

Page 10: CCNAS Chapter 1 CCNA Security 1

9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone

heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 10/10

(originally Internetwork

Operating System)

Cisco IOS 3745 Series

Cisco IOS 3725 Series

Cisco IOS 7200 Series

Cisco IOS 3660 Series

Cisco IOS 3640 Series

FundamentalsNetworking for Home and Small

Businesses Routing

Protocols and

Concepts

Semester 1

Semester 2 Semester

3 Semester 4 TSHOOT Working

at a Small-to-Medium Business or

ISP

© Copyright 2010-2013 · Powered by Wordpress · Terms of Service · Privacy Policy