Q1
What is the primary means for mitigating virus and Trojan horse attacks?
Options:
A) Antivirus software
B) Encryption
C) Blocking ICMP echo and echo-replies
D) Antisniffer software
Answer: A) Antivirus software
1/13
| Term | Definition |
|---|---|
| Q1 What is the primary means for mitigating virus and Trojan horse attacks? Options: A) Antivirus software B) Encryption C) Blocking ICMP echo and echo-replies D) Antisniffer software | Answer: A) Antivirus software |
| Q2 What three items are components of the CIA triad? (Choose three.) Options: A) Scalability B) Integrity C) Availability D) Intervention E) Access F) Confidentiality | Answer: B) Integrity C) Availability F) Confidentiality |
| Q3 Which security implementation will provide control plane protection for a network device? Options: A) Encryption for remote access connections B) Routing protocol authentication C) AAA for authenticating management access D) NTP for consistent timestamps on logging messages | Answer: B) Routing protocol authentication |
| Q4 What threat intelligence group provides blogs and podcasts to help network security professionals remain effective and up-to-date? Options: A) FireEye B) Mitre C) CybOX D) Talos | Answer: D) Talos |
| Q5 Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data? Options: A) Acceptable use policy B) Campus access policy C) Identification and authentication policy D) Internet access policy E) Statement of scope F) Statement of authority | Answer: C) Identification and authentication policy |
| Q6 What worm mitigation phase involves actively disinfecting infected systems? Options: A) Containment B) Inoculation C) Treatment D) Quarantine | Answer: C) Treatment |
| Q7 With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Options: A) Lettuce B) Onion C) Cabbage D) Artichoke | Answer: D) Artichoke |
| Q8 How does BYOD change the way in which businesses implement networks? Options: A) BYOD provides flexibility in where and how users can access network resources. B) BYOD devices are more expensive than devices that are purchased by an organization. C) BYOD requires organizations to purchase laptops rather than desktops. D) BYOD users are responsible for their own network security, thus reducing the need for organizational security policies. | Answer: A) BYOD provides flexibility in where and how users can access network resources. |
| Q9 What functional area of the Cisco Network Foundation Protection framework uses protocols such as Telnet and SSH to manage network devices? Options: A) Management plane B) Control plane C) Data plane D) Forwarding plane | Answer: A) Management plane |
| Q10 What security tool allows a threat actor to hack into a wireless network and detect security vulnerabilities? Options: A) NMap B) KisMac C) Click fuzzers D) SuperScan | Answer: B) KisMac |
| Q11 What is the primary function of SANS? Options: A) To maintain the list of common vulnerabilities and exposures (CVE) B) To maintain the Internet Storm Center C) To provide vendor neutral education products and career services D) To foster cooperation and coordination in information sharing, incident prevention, and rapid reaction | Answer: C) To provide vendor neutral education products and career services |
| Q12 What method can be used to mitigate ping sweeps? Options: A) Using encrypted or hashed authentication protocols B) Installing antivirus software on hosts C) Deploying antisniffer software on all network devices D) Blocking ICMP echo and echo-replies at the network edge | Answer: D) Blocking ICMP echo and echo-replies at the network edge |