Exam Results- CCNAS Chapter 1- CCNA Security Implementing Ne(2)

2019-08-31 17:08

Denial of Service attack brute-force attack IP spoofing attack packet sniffer attack

18 Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)

virus scanning data encryption

anti-spoofing technologies intrusion protection systems applying user authentication

19. Which phase of worm mitigation involves terminating the worm process,

removing modified files or system settings that the worm introduced, and patching the vulnerability that the worm used to exploit the system?

containment inoculation quarantine treatment

20. Which characteristic best describes the network security Compliance

domain as specified by the ISO/IEC?

the integration of security into applications

an inventory and classification scheme for information assets the restriction of access rights to networks, systems, applications, functions, and data

the process of ensuring conformance with security information policies,

standards, and regulations

21. Which statement describes phone freaking?

A hacker uses password-cracking programs to gain access to a computer via a dialup account.

A hacker gains unauthorized access to networks via wireless access points.

A hacker mimics a tone using a whistle to make free long-distance calls

on an analog telephone network.

A hacker uses a program that automatically scans telephone numbers within a local area, dialing each one in search of computers, bulletin board systems, and fax machines.

22. Which two statements describe access attacks? (Choose two.)

Port redirection attacks use a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN. Password attacks can be implemented using brute-force attack

methods, Trojan Horses, or packet sniffers.

Buffer overflow attacks write data beyond the allocated buffer memory

to overwrite valid data or exploit systems to execute malicious code.

Port scanning attacks scan a range of TCP or UDP port numbers on a host to detect listening services.

Trust exploitation attacks can use a laptop acting as a rogue access point to capture and copy all network traffic in a public location on a wireless hotspot.


Exam Results- CCNAS Chapter 1- CCNA Security Implementing Ne(2).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:法律名言警句

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: