3.6.2 Mitigating Threats Quiz

Created by yabdelaziz

Q1 What is the primary means for mitigating virus and Trojan horse attacks? Options: A) Antivirus software B) Encryption C) Blocking ICMP echo and echo-replies D) Antisniffer software
Answer: A) Antivirus software

1/13

TermDefinition
Q1 What is the primary means for mitigating virus and Trojan horse attacks? Options: A) Antivirus software B) Encryption C) Blocking ICMP echo and echo-replies D) Antisniffer softwareAnswer: A) Antivirus software
Q2 What three items are components of the CIA triad? (Choose three.) Options: A) Scalability B) Integrity C) Availability D) Intervention E) Access F) ConfidentialityAnswer: B) Integrity C) Availability F) Confidentiality
Q3 Which security implementation will provide control plane protection for a network device? Options: A) Encryption for remote access connections B) Routing protocol authentication C) AAA for authenticating management access D) NTP for consistent timestamps on logging messagesAnswer: B) Routing protocol authentication
Q4 What threat intelligence group provides blogs and podcasts to help network security professionals remain effective and up-to-date? Options: A) FireEye B) Mitre C) CybOX D) TalosAnswer: D) Talos
Q5 Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data? Options: A) Acceptable use policy B) Campus access policy C) Identification and authentication policy D) Internet access policy E) Statement of scope F) Statement of authorityAnswer: C) Identification and authentication policy
Q6 What worm mitigation phase involves actively disinfecting infected systems? Options: A) Containment B) Inoculation C) Treatment D) Quarantine Answer: C) Treatment
Q7 With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Options: A) Lettuce B) Onion C) Cabbage D) ArtichokeAnswer: D) Artichoke
Q8 How does BYOD change the way in which businesses implement networks? Options: A) BYOD provides flexibility in where and how users can access network resources. B) BYOD devices are more expensive than devices that are purchased by an organization. C) BYOD requires organizations to purchase laptops rather than desktops. D) BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.Answer: A) BYOD provides flexibility in where and how users can access network resources.
Q9 What functional area of the Cisco Network Foundation Protection framework uses protocols such as Telnet and SSH to manage network devices? Options: A) Management plane B) Control plane C) Data plane D) Forwarding planeAnswer: A) Management plane
Q10 What security tool allows a threat actor to hack into a wireless network and detect security vulnerabilities? Options: A) NMap B) KisMac C) Click fuzzers D) SuperScanAnswer: B) KisMac
Q11 What is the primary function of SANS? Options: A) To maintain the list of common vulnerabilities and exposures (CVE) B) To maintain the Internet Storm Center C) To provide vendor neutral education products and career services D) To foster cooperation and coordination in information sharing, incident prevention, and rapid reactionAnswer: C) To provide vendor neutral education products and career services
Q12 What method can be used to mitigate ping sweeps? Options: A) Using encrypted or hashed authentication protocols B) Installing antivirus software on hosts C) Deploying antisniffer software on all network devices D) Blocking ICMP echo and echo-replies at the network edgeAnswer: D) Blocking ICMP echo and echo-replies at the network edge