answer ccna security chapter 1 test - ccnas v1.1 _ invisible algorithm

14
Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM] RECENTLY WRITTEN Disable w3 Total Cache Plugin Completely Unable to Connect to Internet Eset Smart Security Atheros AR5007EG Windows 7 Driver Network Security Chapter 4 Packet Tracer Activity A Answer Answer CCNA Security Chapter 10 Test – CCNAS v1.1 COFFEE FOR ME SEARCH Answer CCNA Security Chapter 1 Test – CCNAS v1.1 This post is about solution or answer for CCNAS Chapter 1. In this post, i will share the question and answer for CCNA Security Chapter 1 Test. I took this CCNAS Chapter 1 test on April 2012. Posted on April 9, 2012 Free CNA Exam Questions Exam Questions Practice Flash Cards Medical Assistant Vocabulary Cards www.cnatutor.org Home Category Search Sitemap Contact Us About CCNA Exam Simulator 300+ challenging CCNA Questions Only $19.95 or Try it Free www.MyPowerPass.com/

Upload: icostyle

Post on 28-Apr-2015

1.321 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

RECENTLY WRITTEN

Disable w3 TotalCache PluginCompletelyUnable to Connectto Internet EsetSmart SecurityAtheros AR5007EGWindows 7 DriverNetwork SecurityChapter 4 PacketTracer Activity AAnswerAnswer CCNASecurity Chapter 10Test – CCNAS v1.1

COFFEE FOR ME

SEARCH

Answer CCNA SecurityChapter 1 Test –CCNAS v1.1

This post is about solution or answer for CCNAS Chapter 1. In thispost, i will share the question and answer for CCNA SecurityChapter 1 Test. I took this CCNAS Chapter 1 test on April 2012.

Posted on April 9, 2012

Free CNA Exam QuestionsExam Questions Practice Flash CardsMedical Assistant Vocabulary Cards

www.cnatutor.org

Home Category Search Sitemap Contact Us About

CCNA Exam Simulator300+ challenging CCNA Questions Only $19.95 or Try it Free

www.MyPowerPass.com/

Page 2: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

InvisibleAlgorithmonFacebook

105 peoplelike

Like

Facebook social plugin

+6

Follow

Find us on Google+

CCNA SECURITY

Chapter 1Chapter 2Chapter 3Chapter 4Chapter 5

CCNAS v1.1 include several new questions. So, this post hopefullywill be your reference to solve all the questions.

1. What are the basic phases of attack that can be used by a virusor worm in sequential order?

paralyze, probe, penetrate, persist, and propagate

probe, penetrate, persist, propagate, and paralyze

penetrate, persist, propagate, paralyze, and probe

persist, propagate, paralyze, probe, and penetrate

2. Which two are characteristics of DoS attacks? (Choose two.)

They always precede access attacks.

They attempt to compromise the availability of a network,host, or application.

They are difficult to conduct and are initiated only by very skilledattackers.

They are commonly launched with a tool called L0phtCrack.

Examples include smurf attacks and ping of death attacks.

3. Users report to the helpdesk that icons usually seen on the menubar are randomly appearing on their computer screens. What couldbe a reason that computers are displaying these random graphics?

An access attack has occurred.

A virus has infected the computers.

A DoS attack has been launched against the network.

The computers are subject to a reconnaissance attack.

Page 3: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10Final Exam

RANDOM TERMS

matlab program forhistogram usingimhistccna 2 chapter 6skills challengeWith securitycontrols a user canonly access a serverwith FTP Which AAAcomponentaccomplishes thisRooting sk17i 4 0 4august

4. What are three types of access attacks? (Choose three.)

buffer overflow

ping sweep

port redirection

trust exploitation

port scan

Internet information query

5. What occurs during a spoofing attack?

One device falsifies data to gain access to privilegedinformation.

Large amounts of network traffic are sent to a target device tomake resources unavailable to intended users.

Improperly formatted packets are forwarded to a target device tocause the target system to crash.

A program writes data beyond the allocated memory to enable theexecution of malicious code.

6. What is a characteristic of a Trojan Horse?

A Trojan Horse can be carried in a virus or worm.

A proxy Trojan Horse opens port 21 on the target system.

An FTP Trojan Horse stops anti-virus programs or firewalls fromfunctioning.

A Trojan Horse can be hard to detect because it closes when the

Association "ITWorld BG"An IT partner you cantrust! E-Learning andTraining Solutionswww.it-world.bg

official Red HatTrainingRed Hat training andcertifications includingRHCE and RHCSAwww.alfavad.com

Cisco 2800Cisco 2801 2811 28212851 Routers 58%-98%Off, 8000+ BuyersWorldwideRouter-switch.com/_Cisco_…

Cisco CCIE R&S,SecurityCisco CCIE R&S Labrental Cisco CCIESecurity Lab Rentalwww.GigaVelocity.com

NetworkingEquipmentSave Upto 90% on New& Used Cisco Juniper,Extreme, Alcatel-Lucent...www.bluecomnetworks.com

http://www.google.com/url?ct=abg&q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/%26gl%3DBG%26hl%3Den%26client%3Dca-pub-8983609636255725%26ai0%3DCHn-ebrCRUL7BMcjO_Abt0oDwCZ35xNEC9aqGyC_AjbcBEAEgpLPCKSgFUM3Xo48CYOXIWsgBAakCc2vICjk9pj6oAwHIA58EqgSiAU_Q1H19SxObdGTKHiveXbYZXuGlx8usVRpLSyG9is_YLD2YIAj69V6H5GciNvDZ7z4_w8ETSI1Ky4CIGVWxEMq4xf_Ri6P91afqPlcw43TzJiwAw-wbBIjHp2P8YUgjSCzXDBjtyJvLKPGLWD8vrvAgCsPvkC9G8vn3b48Mlaa2McYHtZPXyg575namZj6Fs0NS9Kt1Ik6UwsUZ4R2f4ycxUg%26ai1%3DCJG3nbrCRUL7BMcjO_Abt0oDwCfHOmrIEkYbUzWnAjbcBEAIgpLPCKSgFUJ-RwMD9_____wFg5chayAEBqQKxXU_skL-1PqgDAcgDnwSqBKIBT9D0NGhLEJt0ZMoeK95dthle4aXHy6xVGktLIb2Kz9gsPZggCPr1XofkZyI28NnvPj_DwRNIjUrLgIgZVbEQyrjF_9GLo_3Vp-o-VzDjdPMmLADD7BsEiMenY_xhSCNILNcMGO3Im8so8YtYPy-u8CAKw--QL0by-fdvjwzJp5kvxge1k9fKDnvmdqZmPoWzQ1L0q3UiTpTCxRnhHZ_fGCpU%26ai2%3DC1J5ibrCRUL7BMcjO_Abt0oDwCaaZ2JEC7oSfjSLAjbcBEAMgpLPCKSgFULS5wZP______wFg5chayAEBqQJpHjYa14SFPqgDAcgDnwSqBJwBT9C0MHJLEZt0ZMoeK95dthle4aXHy6xVGktLIb2Kz9gsPZggCPr1XofkZyI28NnvPj_DwRNIjUrLgIgZVbEQyrjF_9GLo_3Vp-o-VzDjdPMmLADD7BsEiMenY_xhSCNILNcMGO3Im8so8YtYPy-u8CAKw--QL0by-fdvrw1i1gyiLOz8o9aYD3HgW6eMPWdyQ1L2q3X2W5EkVNLs%26ai3%3DCwWOXbrCRUL7BMcjO_Abt0oDwCZjOzPoB_MH9oQTAjbcBEAQgpLPCKSgFUIrCkewFYOXIWsgBAagDAcgDnwSqBJ8BT9D0NGhLFpt0ZMoeK95dthle4aXHy6xVGktLIb2Kz9gsPZggCPr1XofkZyI28NnvPj_DwRNIjUrLgIgZVbEQyrjF_9GLo_3Vp-o-VzDjdPMmLADD7BsEiMenY_xhSCNILNcMGO3Im8so8YtYPy-u8CAKw--QL0by-fdvxwwp1gxSxgdFeTxz1JENrUaLyGS0tlEyXnbmu5fSJR8dbl01%26ai4%3DCPZ-VbrCRUL7BMcjO_Abt0oDwCaK4y6UCqq_GsyvAjbcBEAUgpLPCKSgFUJbkkI8HYOXIWsgBAagDAcgDnwSqBJwBT9D0NGhLF5t0ZMoeK95dthle4aXHy6xVGktLIb2Kz9gsPZggCPr1XofkZyI28NnvPj_DwRNIjUrLgIgZVbEQyrjF_9GLo_3Vp-o-VzDjdPMmLADD7BsEiMenY_xhSCNILNcMGO3Im8so8YtYPy-u8CAKw--QL0by-fdvrw1i1gyiLOz8o9aYD3HgW6eMPWdyQ1L2q3X2W5EMW-L4&usg=AFQjCNGKChmAs7JEA5LxcskhumqlUfi-fw
Page 4: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

histeq command inmatlab

application that launched it closes.

7. Which phase of worm mitigation requires compartmentalizationand segmentation of the network to slow down or stop the wormand prevent currently infected hosts from targeting and infectingother systems?

containment phase

inoculation phase

quarantine phase

treatment phase

8. Which two statements are characteristics of a virus? (Choosetwo.)

A virus typically requires end-user activation.

A virus has an enabling vulnerability, a propagation mechanism, anda payload.

A virus replicates itself by independently exploiting vulnerabilitiesin networks.

A virus provides the attacker with sensitive data, such aspasswords.

A virus can be dormant and then activate at a specific timeor date.

9. What is a ping sweep?

A ping sweep is a network scanning technique that indicatesthe live hosts in a range of IP addresses.

A ping sweep is a software application that enables the capture ofall network packets sent across a LAN.

Page 5: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

A ping sweep is a scanning technique that examines a range of TCPor UDP port numbers on a host to detect listening services.

A ping sweep is a query and response protocol that identifiesinformation about a domain, including the addresses assigned tothat domain.

10. Which type of security threat can be described as softwarethat attaches to another program to execute a specific unwantedfunction?

virus

worm

proxy Trojan horse

Denial of Service Trojan horse

11. A disgruntled employee is using Wireshark to discoveradministrative Telnet usernames and passwords. What type ofnetwork attack does this describe?

Denial of Service

port redirection

reconnaissance

trust exploitation

12. What occurs during the persist phase of a worm attack?

identification of vulnerable targets

modification of system files and registry settings to ensurethat the attack code is running

Page 6: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

transfer of exploit code through an attack vector

extension of the attack to vulnerable neighboring targets

13. What are the three major components of a worm attack?(Choose three.)

enabling vulnerability

infecting vulnerability

payload

penetration mechanism

probing mechanism

propagation mechanism

14. A network administrator detects unknown sessions involvingport 21 on the network. What could be causing this securitybreach?

An FTP Trojan Horse is executing.

A reconnaissance attack is occurring.

A denial of service attack is occurring.

Cisco Security Agent is testing the network.

15. What are three goals of a port scan attack? (Choose three.)

disable used ports and services

determine potential vulnerabilities

identify active services

Page 7: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

identify peripheral configurations

identify operating systems

discover system passwords

16. How is a Smurf attack conducted?

by sending a large number of packets, overflowing the allocatedbuffer memory of the target device

by sending an echo request in an IP packet larger than themaximum packet size of 65,535 bytes

by sending a large number of ICMP requests to directedbroadcast addresses from a spoofed source address on thesame network

by sending a large number of TCP SYN packets to a target devicefrom a spoofed source address

17. Which access attack method involves a software programattempting to discover a system password by using an electronicdictionary?

buffer overflow attack

port redirection attack

Denial of Service attack

brute-force attack

IP spoofing attack

packet sniffer attack

18 Which two network security solutions can be used to mitigateDoS attacks? (Choose two.)

Page 8: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

virus scanning

data encryption

anti-spoofing technologies

intrusion protection systems

applying user authentication

19. Which phase of worm mitigation involves terminating the wormprocess, removing modified files or system settings that the wormintroduced, and patching the vulnerability that the worm used toexploit the system?

containment

inoculation

quarantine

treatment

20. Which characteristic best describes the network securityCompliance domain as specified by the ISO/IEC?

the integration of security into applications

an inventory and classification scheme for information assets

the restriction of access rights to networks, systems, applications,functions, and data

the process of ensuring conformance with security informationpolicies, standards, and regulations

21. Which statement describes phone freaking?

Page 9: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

A hacker uses password-cracking programs to gain access to acomputer via a dialup account.

A hacker gains unauthorized access to networks via wireless accesspoints.

A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.

A hacker uses a program that automatically scans telephonenumbers within a local area, dialing each one in search ofcomputers, bulletin board systems, and fax machines.

22. Which two statements describe access attacks? (Choose two.)

Port redirection attacks use a network adapter card in promiscuousmode to capture all network packets that are sent across a LAN.

Password attacks can be implemented using brute-force attackmethods, Trojan Horses, or packet sniffers.

Buffer overflow attacks write data beyond the allocatedbuffer memory to overwrite valid data or exploit systems toexecute malicious code.

Port scanning attacks scan a range of TCP or UDP port numbers ona host to detect listening services.

Trust exploitation attacks can use a laptop acting as a rogue accesspoint to capture and copy all network traffic in a public location ona wireless hotspot.

NEW QUESTION

Which statement accurately characterizes the evolution ofnetwork security?

Internal threats can cause even greater damage than externalthreats.Internet architects planned for network security from thebeginning.

Page 10: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

Early Internet users often engaged in activities that would harmother users.Threats have become less sophisticated while the technicalknowledge needed by an attacker has grown.

Which three options describe the phases of worm mitigation?(Choose three.)

The containment phase requires the use of incoming andoutgoing ACLs on routers and firewalls.The containment phase tracks down and identifies the infectedmachines within the contained areas.The inoculation phase disconnects, blocks, or removes infectedmachines.The inoculation phase patches uninfected systems with theappropriate vendor patch for the vulnerability.The quarantine phase terminates the worm process, removesmodified files or system settings, and patches the vulnerabilitythe worm used to exploit the system.The treatment phase disinfects actively infected systems.

[Corrected by: Huy Nguyen]

An attacker is using a laptop as a rogue access point to capture allnetwork traffic from a targeted user. Which type of attack isthis?

trust exploitationbuffer overflowman in the middleport redirection

What is considered a valid method of securing the control plane inthe Cisco NFP framework?

authorization of actionsDHCP snoopingdynamic ARP inspectionlogin and password policy

Page 11: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

routing protocol authenticationrole-based access control

[Updated by Xase]

A port scan is classified as what type of attack?

access attack

Denial of Service attack

reconnaissance attack

spoofing attack

Which type of software typically uses a network adapter card inpromiscuous mode to capture all network packets that are sentacross a LAN?

port scanner

ping sweeper

packet sniffer

Internet information query

What are two reasons for securing the data plane in the Cisco NFPframework? (Choose two.)

to protect against DoS attacks

to provide bandwidth control

to force technicians to use SSH and HTTPS when managing devices

to provide a record of who accessed the device, what occurred, andwhen it occurred

Page 12: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

ONE THOUGHT ON “ANSWER CCNA SECURITY CHAPTER 1 TEST – CCNAS V1.1”

to allow users to control the flow of traffic that is managed by theroute processor of their network devices

Please take note this answer is not 100% correct. I only got 95.7%for this CCNAS Chapter 1 Test. There might be mistake on thenew questions. If you think that you have better answer, pleaseshare with us.

Thank You

This entry was posted in Network Security and tagged 2012, CCNA Security,CCNA Security Chapter 1 answer, CCNAS Chapter 1, CCNAS v1.1,Chapter 1 Test, Solution CCNA Security Chapter 1 by InviAlgo. Bookmarkthe permalink.

Hosts Apply for student loan Virus Protection Web hosting services

Huy Nguyen on April 13, 2012 at 10:10 AM

said:

I use 10 min mail, so plx don’t replyon question, “Which three optionsdescribe the phases of worm mitigation?”Answer would be:The containment phase requires the useof incoming and outgoing ACLs onrouters and firewalls.

The inoculation phase patchesuninfected systems with the appropriatevendor patch for the vulnerability.

The treatment phase disinfects activelyinfected systems.

Reply ↓

Page 13: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

Search Invisible Algorithm:What are two reasons for securing the data plane in the Cisco NFPframework? (Choose two ), Which statement accurately characterizesthe evolution of network security?, What is considered a valid methodof securing the control plane in the Cisco NFP framework?, what isconsidered a valid method of securing the control plane in the cisconfp framework, which statement accurately characterizes the evolutionof network security, what are two reasons for securing the data planein the cisco nfp framework?, what are two reasons for securing thedata plane in the cisco nfp framework, Which three options describe

Leave a ReplyYour email address will not be published. Requiredfields are marked *

All

Notify me of followup

comments via e-mail. You

can also subscribe without commenting.

Name *

Email *

Website

Comment

Page 14: Answer CCNA Security Chapter 1 Test - CCNAS v1.1 _ Invisible Algorithm

Answer CCNA Security Chapter 1 Test - CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-1-test-ccnas-v1-1/[11/1/2012 1:13:44 AM]

the phases of worm mitigation? (Choose three ), ccna security chapter4 exam answers, ccna security chapter 10 answers