Upload
sergiy-kalmuk
View
69
Download
2
Embed Size (px)
DESCRIPTION
nice books for CCNA
Citation preview
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 1/10
Search my website ...
You are here: Home / Cisco Associate / CCNA
Security / CCNAS Chapter 1 CCNA Security 1.0
2012 2013 100%
CCNAS Chapter 1 CCNA Security1.0 2012 2013 100%
January 1, 2012 by HeiseR 0 Comments
CCNAS Chapter 1 – CCNASecurity: ImplementingNetwork Security (Version1.0) – Answers – 2012 –2013
1. What are the basic phases of attack that can be
used by a virus or worm in sequential order?
paralyze, probe, penetrate, persist, and propagate
probe, penetrate, persist, propagate, and paralyze
penetrate, persist, propagate, paralyze, and probe
persist, propagate, paralyze, probe, and penetrate
2. Which two are characteristics of DoS attacks?
Online
Email Newsletter
Sign up to receive email
updates and
to hear what's going on with
my website!
Enter your email address...
Popular Posts
ERouting Final Exam CCNA 2
4.0 2012 2013 100%
DsmbISP Chapter 1 CCNA
Discovery 2 4.1 2012 2013
100%
DHomesb Final Exam CCNA
Discovery 1 4.0 2012 2013
100%
ENetwork Final Exam CCNA 1
4.0 2012 2013 100%
ERouting Chapter 1 CCNA 2
4.0 2012 2013 100%
Home Cisco Associate Cisco Professional Cisco Expert
Virtualization Job Tool
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 2/10
(Choose two.)
They always precede access attacks.
They attempt to compromise the availability of a network,
host, or application.
They are difficult to conduct and are initiated only by very
skilled attackers.
They are commonly launched with a tool called
L0phtCrack.
Examples include smurf attacks and ping of death attacks.
3. Users report to the helpdesk that icons usually
seen on the menu bar are randomly appearing on
their computer screens. What could be a reason that
computers are displaying these random graphics?
An access attack has occurred.
A virus has infected the computers.
A DoS attack has been launched against the network.
The computers are subject to a reconnaissance attack.
4. What are three types of access attacks? (Choose
three.)
buffer overflow
ping sweep
port redirection
trust exploitation
port scan
Internet information query
5. What occurs during a spoofing attack?
One device falsifies data to gain access to privileged
information.
Large amounts of network traffic are sent to a target device
to make resources unavailable to intended users.
Improperly formatted packets are forwarded to a target
device to cause the target system to crash.
ERouting Chapter 3 CCNA 2
4.0 2012 2013 100%
ERouting Chapter 4 CCNA 2
4.0 2012 2013 100%
Cisco IOS Collection
(originally Internetwork
Operating System)
ENetwork Chapter 8 CCNA 1
4.0 2012 2013 100%
ENetwork Skill Exam CCNA 1
4.0 2012 2013 100%
Categories
Select Category
CCNAS 1.0 &CCNP 6.0 Answers
CCNAS ROUTESWITCHTSHOOT
1 1 1 1
2 2 2 2
3 3 3 3
4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7
8 8 8
9 9
Final Final Final Final
Sponsored
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 3/10
A program writes data beyond the allocated memory to
enable the execution of malicious code.
6. What is a characteristic of a Trojan Horse?
A Trojan Horse can be carried in a virus or worm.
A proxy Trojan Horse opens port 21 on the target system.
An FTP Trojan Horse stops anti-virus programs or firewalls
from functioning.
A Trojan Horse can be hard to detect because it closes
when the application that launched it closes.
7. Which phase of worm mitigation requires
compartmentalization and segmentation of the
network to slow down or stop the worm and prevent
currently infected hosts from targeting and infecting
other systems?
containment phase
inoculation phase
quarantine phase
treatment phase
8. Which two statements are characteristics of a
virus? (Choose two.)
A virus typically requires end-user activation.
A virus has an enabling vulnerability, a propagation
mechanism, and a payload.
A virus replicates itself by independently exploiting
vulnerabilities in networks.
A virus provides the attacker with sensitive data, such as
passwords.
A virus can be dormant and then activate at a specific time
or date.
9. What is a ping sweep?
A ping sweep is a network scanning technique that
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 4/10
indicates the live hosts in a range of IP addresses.
A ping sweep is a software application that enables the
capture of all network packets sent across a LAN.
A ping sweep is a scanning technique that examines a
range of TCP or UDP port numbers on a host to detect
listening services.
A ping sweep is a query and response protocol that
identifies information about a domain, including the
addresses assigned to that domain.
10. Which type of security threat can be described as
software that attaches to another program to execute
a specific unwanted function?
virus
worm
proxy Trojan horse
Denial of Service Trojan horse
11. A disgruntled employee is using Wireshark to
discover administrative Telnet usernames and
passwords. What type of network attack does this
describe?
Denial of Service
port redirection
reconnaissance
trust exploitation
12. What occurs during the persist phase of a worm
attack?
identification of vulnerable targets
modification of system files and registry settings to ensure
that the attack code is running
transfer of exploit code through an attack vector
extension of the attack to vulnerable neighboring targets
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 5/10
13. What are the three major components of a worm
attack? (Choose three.)
enabling vulnerability
infecting vulnerability
payload
penetration mechanism
probing mechanism
propagation mechanism
14. A network administrator detects unknown
sessions involving port 21 on the network. What
could be causing this security breach?
An FTP Trojan Horse is executing.
A reconnaissance attack is occurring.
A denial of service attack is occurring.
Cisco Security Agent is testing the network.
15. What are three goals of a port scan attack?
(Choose three.)
disable used ports and services
determine potential vulnerabilities
identify active services
identify peripheral configurations
identify operating systems
discover system passwords
16. How is a Smurf attack conducted?
by sending a large number of packets, overflowing the
allocated buffer memory of the target device
by sending an echo request in an IP packet larger than the
maximum packet size of 65,535 bytes
by sending a large number of ICMP requests to directed
broadcast addresses from a spoofed source address on
the same network
by sending a large number of TCP SYN packets to a target
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 6/10
device from a spoofed source address
17. Which access attack method involves a software
program attempting to discover a system password
by using an electronic dictionary?
buffer overflow attack
port redirection attack
Denial of Service attack
brute-force attack
IP spoofing attack
packet sniffer attack
18 Which two network security solutions can be used
to mitigate DoS attacks? (Choose two.)
virus scanning
data encryption
anti-spoofing technologies
intrusion protection systems
applying user authentication
19. Which phase of worm mitigation involves
terminating the worm process, removing modified
files or system settings that the worm introduced,
and patching the vulnerability that the worm used to
exploit the system?
containment
inoculation
quarantine
treatment
20. Which characteristic best describes the network
security Compliance domain as specified by the
ISO/IEC?
the integration of security into applications
an inventory and classification scheme for information
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 7/10
Share this:
assets
the restriction of access rights to networks, systems,
applications, functions, and data
the process of ensuring conformance with security
information policies, standards, and regulations
21. Which statement describes phone freaking?
A hacker uses password-cracking programs to gain
access to a computer via a dialup account.
A hacker gains unauthorized access to networks via
wireless access points.
A hacker mimics a tone using a whistle to make free long-
distance calls on an analog telephone network.
A hacker uses a program that automatically scans
telephone numbers within a local area, dialing each one in
search of computers, bulletin board systems, and fax
machines.
22. Which two statements describe access attacks?
(Choose two.)
Port redirection attacks use a network adapter card in
promiscuous mode to capture all network packets that are
sent across a LAN.
Password attacks can be implemented using brute-force
attack methods, Trojan Horses, or packet sniffers.
Buffer overflow attacks write data beyond the allocated
buffer memory to overwrite valid data or exploit systems to
execute malicious code.
Port scanning attacks scan a range of TCP or UDP port
numbers on a host to detect listening services.
Trust exploitation attacks can use a laptop acting as a
rogue access point to capture and copy all network traffic
in a public location on a wireless hotspot.
Twitter Google +1 Facebook More
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 8/10
Like this:
Be the first to like this.
Like
Related posts:
1. CCNAS Chapter 6 CCNA Security 1.0 2012 2013
100%
2. CCNAS Chapter 5 CCNA Security 1.0 2012 2013
100%
3. CCNAS Chapter 9 CCNA Security 1.0 2012 2013
100%
4. CCNAS Chapter 7 CCNA Security 1.0 2012 2013
100%
Filed Under: CCNA Security
Tagged With: Chapter 1
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 9/10
0 comments
What's this?ALSO ON HEISER DEV ZONE
Passed CCNA exam
with 1000 points
10 months ago
DsmbISP Final Exam
CCNA Discovery 2 4.1
2012 100%3 comments • 10 months ago
Dex — cisco sucks.
DsmbISP Chapter 6
CCNA Discovery 2 4.1
2012 100%1 comment • 10 months ago
patrick — Its very useful
but i got 94.7%
ERouting Chapter 9
CCNA 2 4.0 2012 100%
1 comment • 10 months ago
disqus_ZFfpl6dPjc —
answer 10 (right answer
is 1 not 5) a query for
network
Leave a message...
Best ⚙ ⤤Share
No one has commented yet.
0★
Recent Posts
Cisco IOS 2691 Series
Modular Router
Cisco IOS Big Collection
Cisco IOS 1841 Series
Integrated Services Router
VMware Offline Demos Full
List
Cisco IOS Collection
Tags
Accessing the WAN
Chapter 1 Chapter 2
Chapter 3 Chapter 4
Chapter 5 Chapter 6
Chapter 8 Chapter 9 Final
Exam LAN Switching and
Wireless Network
Follow us
Google+
Feed / Atom / Feedburner
9/16/13 CCNAS Chapter 1 CCNA Security 1.0 2012 2013 100% — HeiseR Dev Zone
heiserz.com/2012/01/01/ccnas-chapter-1-ccna-security-1-0-2012-100/ 10/10
(originally Internetwork
Operating System)
Cisco IOS 3745 Series
Cisco IOS 3725 Series
Cisco IOS 7200 Series
Cisco IOS 3660 Series
Cisco IOS 3640 Series
FundamentalsNetworking for Home and Small
Businesses Routing
Protocols and
Concepts
Semester 1
Semester 2 Semester
3 Semester 4 TSHOOT Working
at a Small-to-Medium Business or
ISP
© Copyright 2010-2013 · Powered by Wordpress · Terms of Service · Privacy Policy