Cisco Attacks

Cisco Attacks

10th Grade

26 Qs

quiz-placeholder

Similar activities

Cybersecurity: Ch 5 & 6

Cybersecurity: Ch 5 & 6

9th - 12th Grade

21 Qs

EXAMEN SEGUNDO TRIMESTRE

EXAMEN SEGUNDO TRIMESTRE

10th Grade

21 Qs

Quiz 1

Quiz 1

University

23 Qs

KUIS INFORMATIKA (KOMPUTER)

KUIS INFORMATIKA (KOMPUTER)

12th Grade

21 Qs

latihan soal informatika SMALSA

latihan soal informatika SMALSA

10th Grade

25 Qs

Storage and Memory Test

Storage and Memory Test

10th - 11th Grade

21 Qs

10H2 - Networks 2

10H2 - Networks 2

10th Grade

21 Qs

Work From Home

Work From Home

12th Grade

25 Qs

Cisco Attacks

Cisco Attacks

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Pei Zhang

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is a Malware that holds a computer system captive until a payment is made to the attacker?

Spyware

Adware

Ransomeware

Virus

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the most common goal of search engine optimization (SEO) poisoning?

To trick someone into installing malware or divulging personal information

To overwhelm a network device with maliciously formed packets

To build a botnet of zombies

To increase web traffic to malicious sites

3.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

A set of changes done to any program or application with the aim of updating, fixing or improving it is what?

A fix

A hack

An install

A patch

4.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following should be carried out to address known software vulnerabilities of a specific application?

Change the hardware

Change the software

Remove the application

Install a security patch

5.

MULTIPLE SELECT QUESTION

20 sec • 3 pts

Which of the following characteristics describe a worm? (Choose Two)

Infects computers by attaching to software code

Hides in a dormant state until needed by an attacker

Travels to new computers without any intervention or knowledge of the user

Is self-replicating

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which statement about the operation of a standard ACL is incorrect?

The router extracts the source IPv4 address from the packet header.

Router starts at top of ACL and compares address to each ACE sequentially

When a match is made, the ACE either permits or denies the packet

If there are no matching ACEs in the ACL, the packet is forwarded

7.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

Which of the following is an ACL best practice?

Always test ACLs on a production network.

Create your ACLs on a production router.

Document the ACLs using the description ACL command.

Write the ACL before configuring it on a router.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?