Cisco Network Device Maintenance Cisco Network Device Maintenance,Log Management,Network Monitoring “Do I Know This Already?” Quiz– Cisco Attacks and Threats

“Do I Know This Already?” Quiz– Cisco Attacks and Threats

Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes,” found at the end of the book, includes both the answers and explanations. You can also find answers in the PTP testing software.

Table 19-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping

Caution

The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question as wrong for purposes of the self-assessment.

Giving yourself credit for an answer you incorrectly guess skews your self-assessment results and might provide you with a false sense of security.

1.  What is a network’s attack surface?

a.  The set of walls, doors, gates, etc., along the perimeter of the network

b.  Every point where the network connects to the outside world

c.  A possible point of attack against a defensive system

d.  A potential violation of security

2.  What is a vulnerability?

a.  The set of walls, doors, gates, etc., along the perimeter of the network

b.  Every point where the network connects to the outside world

c.  A possible point of attack against a defensive system

d.  A potential violation of security

3.  What is an exploit?

a.  Every point where the network connects to the outside world

b.  A possible point of attack against a defensive system

c.  A potential violation of security

d.  A tool designed to allow a threat actor to take advantage of a vulnerability

4.  What are the two differences between spam and phishing? (Choose two.)

a.  Spam is sent to a large audience; phishing is targeted at one person.

b.  Phishing is sent to a large audience; spam is targeted at one person.

c.  Spam does not require a lot of research time; phishing requires research about the target.

d.  Phishing does not require a lot of research time; spam requires research about the target.

5.  Which of the following is an objective of malware?

a.  Prevent other malware from being installed on the host

b.  Translate everything the user sees into another language

c.  Leak private information to the attacker

d.  Make people sick so they cannot work

6.  What kinds of information can an attacker access using an MITM?

a.  Only information transmitted “in the clear” or without encryption

b.  Anything transmitted using session encryption

c.  Anything in either the transmitter’s or receiver’s memory

d.  Anything displayed on the transmitters computer screen

7.  What is the importance of lateral movement to an attacker?

a.  What is the importance of lateral movement to an attacker?

b.  To discover who works at the organization

c.  To discover printers so the attacker can print things

d.  To discover hosts and services containing the organization’s critical information

8.  What is a C2 system?

a.  A system used to find and remove malware from a host or other device

b.  A system used to manage DDoS attacks

c.  A system used by attackers to maintain access to the network

d.  A system used to launch a DoS attack

9.  From where can an attacker launch a DDoS attack?

a.  From within the network

b.  From within the same city as the network

c.  From within the same country as the network

d.  From anywhere in the world

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Post