answer ccna security chapter 1 test - ccnas v1.1 _ invisible algorithm
TRANSCRIPT
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
RECENTLY WRITTEN
Disable w3 TotalCache PluginCompletelyUnable to Connectto Internet EsetSmart SecurityAtheros AR5007EGWindows 7 DriverNetwork SecurityChapter 4 PacketTracer Activity AAnswerAnswer CCNASecurity Chapter 10Test – CCNAS v1.1
COFFEE FOR ME
SEARCH
Answer CCNA SecurityChapter 1 Test –CCNAS v1.1
This post is about solution or answer for CCNAS Chapter 1. In thispost, i will share the question and answer for CCNA SecurityChapter 1 Test. I took this CCNAS Chapter 1 test on April 2012.
Posted on April 9, 2012
Free CNA Exam QuestionsExam Questions Practice Flash CardsMedical Assistant Vocabulary Cards
www.cnatutor.org
Home Category Search Sitemap Contact Us About
CCNA Exam Simulator300+ challenging CCNA Questions Only $19.95 or Try it Free
www.MyPowerPass.com/
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
InvisibleAlgorithmonFacebook
105 peoplelike
Like
Facebook social plugin
+6
Follow
Find us on Google+
CCNA SECURITY
Chapter 1Chapter 2Chapter 3Chapter 4Chapter 5
CCNAS v1.1 include several new questions. So, this post hopefullywill be your reference to solve all the questions.
1. What are the basic phases of attack that can be used by a virusor worm in sequential order?
paralyze, probe, penetrate, persist, and propagate
probe, penetrate, persist, propagate, and paralyze
penetrate, persist, propagate, paralyze, and probe
persist, propagate, paralyze, probe, and penetrate
2. Which two are characteristics of DoS attacks? (Choose two.)
They always precede access attacks.
They attempt to compromise the availability of a network,host, or application.
They are difficult to conduct and are initiated only by very skilledattackers.
They are commonly launched with a tool called L0phtCrack.
Examples include smurf attacks and ping of death attacks.
3. Users report to the helpdesk that icons usually seen on the menubar are randomly appearing on their computer screens. What couldbe a reason that computers are displaying these random graphics?
An access attack has occurred.
A virus has infected the computers.
A DoS attack has been launched against the network.
The computers are subject to a reconnaissance attack.
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10Final Exam
RANDOM TERMS
matlab program forhistogram usingimhistccna 2 chapter 6skills challengeWith securitycontrols a user canonly access a serverwith FTP Which AAAcomponentaccomplishes thisRooting sk17i 4 0 4august
4. What are three types of access attacks? (Choose three.)
buffer overflow
ping sweep
port redirection
trust exploitation
port scan
Internet information query
5. What occurs during a spoofing attack?
One device falsifies data to gain access to privilegedinformation.
Large amounts of network traffic are sent to a target device tomake resources unavailable to intended users.
Improperly formatted packets are forwarded to a target device tocause the target system to crash.
A program writes data beyond the allocated memory to enable theexecution of malicious code.
6. What is a characteristic of a Trojan Horse?
A Trojan Horse can be carried in a virus or worm.
A proxy Trojan Horse opens port 21 on the target system.
An FTP Trojan Horse stops anti-virus programs or firewalls fromfunctioning.
A Trojan Horse can be hard to detect because it closes when the
Association "ITWorld BG"An IT partner you cantrust! E-Learning andTraining Solutionswww.it-world.bg
official Red HatTrainingRed Hat training andcertifications includingRHCE and RHCSAwww.alfavad.com
Cisco 2800Cisco 2801 2811 28212851 Routers 58%-98%Off, 8000+ BuyersWorldwideRouter-switch.com/_Cisco_…
Cisco CCIE R&S,SecurityCisco CCIE R&S Labrental Cisco CCIESecurity Lab Rentalwww.GigaVelocity.com
NetworkingEquipmentSave Upto 90% on New& Used Cisco Juniper,Extreme, Alcatel-Lucent...www.bluecomnetworks.com
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
histeq command inmatlab
application that launched it closes.
7. Which phase of worm mitigation requires compartmentalizationand segmentation of the network to slow down or stop the wormand prevent currently infected hosts from targeting and infectingother systems?
containment phase
inoculation phase
quarantine phase
treatment phase
8. Which two statements are characteristics of a virus? (Choosetwo.)
A virus typically requires end-user activation.
A virus has an enabling vulnerability, a propagation mechanism, anda payload.
A virus replicates itself by independently exploiting vulnerabilitiesin networks.
A virus provides the attacker with sensitive data, such aspasswords.
A virus can be dormant and then activate at a specific timeor date.
9. What is a ping sweep?
A ping sweep is a network scanning technique that indicatesthe live hosts in a range of IP addresses.
A ping sweep is a software application that enables the capture ofall network packets sent across a LAN.
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
A ping sweep is a scanning technique that examines a range of TCPor UDP port numbers on a host to detect listening services.
A ping sweep is a query and response protocol that identifiesinformation about a domain, including the addresses assigned tothat domain.
10. Which type of security threat can be described as softwarethat attaches to another program to execute a specific unwantedfunction?
virus
worm
proxy Trojan horse
Denial of Service Trojan horse
11. A disgruntled employee is using Wireshark to discoveradministrative Telnet usernames and passwords. What type ofnetwork attack does this describe?
Denial of Service
port redirection
reconnaissance
trust exploitation
12. What occurs during the persist phase of a worm attack?
identification of vulnerable targets
modification of system files and registry settings to ensurethat the attack code is running
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
transfer of exploit code through an attack vector
extension of the attack to vulnerable neighboring targets
13. What are the three major components of a worm attack?(Choose three.)
enabling vulnerability
infecting vulnerability
payload
penetration mechanism
probing mechanism
propagation mechanism
14. A network administrator detects unknown sessions involvingport 21 on the network. What could be causing this securitybreach?
An FTP Trojan Horse is executing.
A reconnaissance attack is occurring.
A denial of service attack is occurring.
Cisco Security Agent is testing the network.
15. What are three goals of a port scan attack? (Choose three.)
disable used ports and services
determine potential vulnerabilities
identify active services
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
identify peripheral configurations
identify operating systems
discover system passwords
16. How is a Smurf attack conducted?
by sending a large number of packets, overflowing the allocatedbuffer memory of the target device
by sending an echo request in an IP packet larger than themaximum packet size of 65,535 bytes
by sending a large number of ICMP requests to directedbroadcast addresses from a spoofed source address on thesame network
by sending a large number of TCP SYN packets to a target devicefrom a spoofed source address
17. Which access attack method involves a software programattempting to discover a system password by using an electronicdictionary?
buffer overflow attack
port redirection attack
Denial of Service attack
brute-force attack
IP spoofing attack
packet sniffer attack
18 Which two network security solutions can be used to mitigateDoS attacks? (Choose two.)
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
virus scanning
data encryption
anti-spoofing technologies
intrusion protection systems
applying user authentication
19. Which phase of worm mitigation involves terminating the wormprocess, removing modified files or system settings that the wormintroduced, and patching the vulnerability that the worm used toexploit the system?
containment
inoculation
quarantine
treatment
20. Which characteristic best describes the network securityCompliance domain as specified by the ISO/IEC?
the integration of security into applications
an inventory and classification scheme for information assets
the restriction of access rights to networks, systems, applications,functions, and data
the process of ensuring conformance with security informationpolicies, standards, and regulations
21. Which statement describes phone freaking?
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
A hacker uses password-cracking programs to gain access to acomputer via a dialup account.
A hacker gains unauthorized access to networks via wireless accesspoints.
A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.
A hacker uses a program that automatically scans telephonenumbers within a local area, dialing each one in search ofcomputers, bulletin board systems, and fax machines.
22. Which two statements describe access attacks? (Choose two.)
Port redirection attacks use a network adapter card in promiscuousmode to capture all network packets that are sent across a LAN.
Password attacks can be implemented using brute-force attackmethods, Trojan Horses, or packet sniffers.
Buffer overflow attacks write data beyond the allocatedbuffer memory to overwrite valid data or exploit systems toexecute malicious code.
Port scanning attacks scan a range of TCP or UDP port numbers ona host to detect listening services.
Trust exploitation attacks can use a laptop acting as a rogue accesspoint to capture and copy all network traffic in a public location ona wireless hotspot.
NEW QUESTION
Which statement accurately characterizes the evolution ofnetwork security?
Internal threats can cause even greater damage than externalthreats.Internet architects planned for network security from thebeginning.
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
Early Internet users often engaged in activities that would harmother users.Threats have become less sophisticated while the technicalknowledge needed by an attacker has grown.
Which three options describe the phases of worm mitigation?(Choose three.)
The containment phase requires the use of incoming andoutgoing ACLs on routers and firewalls.The containment phase tracks down and identifies the infectedmachines within the contained areas.The inoculation phase disconnects, blocks, or removes infectedmachines.The inoculation phase patches uninfected systems with theappropriate vendor patch for the vulnerability.The quarantine phase terminates the worm process, removesmodified files or system settings, and patches the vulnerabilitythe worm used to exploit the system.The treatment phase disinfects actively infected systems.
[Corrected by: Huy Nguyen]
An attacker is using a laptop as a rogue access point to capture allnetwork traffic from a targeted user. Which type of attack isthis?
trust exploitationbuffer overflowman in the middleport redirection
What is considered a valid method of securing the control plane inthe Cisco NFP framework?
authorization of actionsDHCP snoopingdynamic ARP inspectionlogin and password policy
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
routing protocol authenticationrole-based access control
[Updated by Xase]
A port scan is classified as what type of attack?
access attack
Denial of Service attack
reconnaissance attack
spoofing attack
Which type of software typically uses a network adapter card inpromiscuous mode to capture all network packets that are sentacross a LAN?
port scanner
ping sweeper
packet sniffer
Internet information query
What are two reasons for securing the data plane in the Cisco NFPframework? (Choose two.)
to protect against DoS attacks
to provide bandwidth control
to force technicians to use SSH and HTTPS when managing devices
to provide a record of who accessed the device, what occurred, andwhen it occurred
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
ONE THOUGHT ON “ANSWER CCNA SECURITY CHAPTER 1 TEST – CCNAS V1.1”
to allow users to control the flow of traffic that is managed by theroute processor of their network devices
Please take note this answer is not 100% correct. I only got 95.7%for this CCNAS Chapter 1 Test. There might be mistake on thenew questions. If you think that you have better answer, pleaseshare with us.
Thank You
This entry was posted in Network Security and tagged 2012, CCNA Security,CCNA Security Chapter 1 answer, CCNAS Chapter 1, CCNAS v1.1,Chapter 1 Test, Solution CCNA Security Chapter 1 by InviAlgo. Bookmarkthe permalink.
Hosts Apply for student loan Virus Protection Web hosting services
Huy Nguyen on April 13, 2012 at 10:10 AM
said:
I use 10 min mail, so plx don’t replyon question, “Which three optionsdescribe the phases of worm mitigation?”Answer would be:The containment phase requires the useof incoming and outgoing ACLs onrouters and firewalls.
The inoculation phase patchesuninfected systems with the appropriatevendor patch for the vulnerability.
The treatment phase disinfects activelyinfected systems.
Reply ↓
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
Search Invisible Algorithm:What are two reasons for securing the data plane in the Cisco NFPframework? (Choose two ), Which statement accurately characterizesthe evolution of network security?, What is considered a valid methodof securing the control plane in the Cisco NFP framework?, what isconsidered a valid method of securing the control plane in the cisconfp framework, which statement accurately characterizes the evolutionof network security, what are two reasons for securing the data planein the cisco nfp framework?, what are two reasons for securing thedata plane in the cisco nfp framework, Which three options describe
Leave a ReplyYour email address will not be published. Requiredfields are marked *
All
Notify me of followup
comments via e-mail. You
can also subscribe without commenting.
Name *
Email *
Website
Comment
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm
http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]
the phases of worm mitigation? (Choose three ), ccna security chapter4 exam answers, ccna security chapter 10 answers