Final Exam Flashcards
Which two techniques are used in a smurf attack? (Choose two.)
session hijacking
- reflection
- amplification
- botnets
- resource exhaustion
reflection
amplification
What are three goals of a port scan attack? (Choose three.)
- to discover system passwords
- to identify operating systems
- to identify active services
- to identify peripheral configurations
- to determine potential vulnerabilities
- to disable used ports and services
- to identify operating systems
- to identify active services
- to determine potential vulnerabilities
When establishing a network profile for an organization, which element describes the time between the establishment of a data flow and its termination?
- routing protocol convergence
- total throughput
- session duration
- bandwidth of the Internet connection
session duration
In addressing an identified risk, which strategy aims to shift some of the risk to other parties?
- risk avoidance
- risk retention
- risk reduction
- risk sharing
risk sharing
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
- a type of virus
- a type of worm
- a type of ransomware
- a type of logic bomb
a type of ransomware
What characterizes a threat actor?
- They are all highly-skilled individuals.
- They always try to cause some harm to an individual or organization.
- They always use advanced tools to launch attacks.
- They all belong to organized crime.
They always try to cause some harm to an individual or organization
What subnet mask is represented by the slash notation /20?
255.255.255.248
255.255.224.0
255.255.255.192
255.255.240.0
255.255.255.0
The slash notation /20 represents a subnet mask with 20 1s.
This would translate to: 11111111.11111111.11110000.0000, which in turn would convert into 255.255.240.0.
A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the network identifier of the device?
- 1000:00d8:0058:00ab
- 2001
- 2001:0db8:cafe:4500:1000:00d8:0058:00ab
- 2001:0db8:cafe:4500:1000
- 2001:0db8:cafe:4500
2001:0db8:cafe:4500:1000
Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
- only application and Internet layers
- only application, transport, network, data link, and physical layers
- application, session, transport, network, data link, and physical layers
- application, transport, Internet, and network access layers
- only Internet and network access layers
only application, Internet, and network access layers
application, transport, Internet, and network access layers
What best describes the destination IPv4 address that is used by multicasting?
- a single IP multicast address that is used by all destinations in a group
- an IP address that is unique for each destination in the group
- a 48 bit address that is determined by the number of members in the multicast group
- a group address that shares the last 23 bits with the source IPv4 address
a single IP multicast address that is used by all destinations in a group
A threat actor has identified the potential vulnerability of the web server of an organization and is building an attack. What will the threat actor possibly do to build an attack weapon?
- Collect credentials of the web server developers and administrators.
- Install a webshell on the web server for persistent access.
- Obtain an automated tool in order to deliver the malware payload through the vulnerability.
- Create a point of persistence by adding services.
Obtain an automated tool in order to deliver the malware payload through the vulnerability.
Which type of data would be considered an example of volatile data?
- web browser cache
- log files
- memory registers
- temp files
memory registers
What type of attack targets an SQL database using the input field of a user?
- XML injection
- SQL injection
- buffer overflow
- Cross-site scripting
SQL injection
What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?
- CAM table attack
- DHCP spoofing
- IP address spoofing
- DHCP starvation
DHCP starvation
Which wireless parameter is used by an access point to broadcast frames that include the SSID?
- passive mode
- active mode
- channel setting
- security mode
passive mode
How can statistical data be used to describe or predict network behavior?
- by displaying alert messages that are generated by Snort
- by comparing normal network behavior to current network behavior
- by recording conversations between network endpoints
- by listing results of user web surfing activities
by comparing normal network behavior to current network behavior
Which Windows Event Viewer log includes events regarding the operation of drivers, processes, and hardware?
- application logs
- security logs
- setup logs
- system logs
system logs
What is the primary objective of a threat intelligence platform (TIP)?
- to provide a specification for an application layer protocol that allows the communication of CTI over HTTPS
- to provide a security operations platform that integrates and enhances diverse security tools and threat intelligence
- to aggregate the data in one place and present it in a comprehensible and usable format
- to provide a standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations
to provide a security operations platform that integrates and enhances diverse security tools and threat intelligence
An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)
- HTTPS web service
- file and directory access permission
- 802.1x authentication
- FTP transfers
- local NTP server
- file and directory access permission
- 802.1x authentication
Explanation: The Public Key Infrastructure (PKI) is a third party-system referred to as a certificate authority or CA. The PKI is the framework used to securely exchange information between parties.
Which two statements describe the use of asymmetric algorithms? (Choose two.)
- If a private key is used to encrypt the data, a private key must be used to decrypt the data.
- If a public key is used to encrypt the data, a public key must be used to decrypt the data.
- Public and private keys may be used interchangeably.
- If a private key is used to encrypt the data, a public key must be used to decrypt the data.
- If a public key is used to encrypt the data, a private key must be used to decrypt the data.
- If a private key is used to encrypt the data, a public key must be used to decrypt the data.
- If a public key is used to encrypt the data, a private key must be used to decrypt the data.
Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?
- Require remote access connections through IPsec VPN.
- Deploy a Cisco SSL Appliance.
- Deploy a Cisco ASA.
- Use a Syslog server to capture network traffic.
Deploy a Cisco SSL Appliance
What are two characteristics of the SLAAC method for IPv6 address configuration? (Choose two.)
- Clients send router advertisement messages to routers to request IPv6 addressing.
- IPv6 addressing is dynamically assigned to clients through the use of ICMPv6.
- This stateful method of acquiring an IPv6 address requires at least one DHCPv6 server.
- The default gateway of an IPv6 client on a LAN will be the link-local address of the router interface attached to the LAN.
- Router solicitation messages are sent by the router to offer IPv6 addressing to clients.
- The default gateway of an IPv6 client on a LAN will be the link-local address of the router interface attached to the LAN.
- IPv6 addressing is dynamically assigned to clients through the use of ICMPv6.
Explanation: With SLAAC, the default gateway for IPv6 clients will be the link-local address of the router interface that is attached to the client LAN. The IPv6 addressing is dynamically assigned via the ICMPv6 protocol.
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)
- router solicitation
- neighbor advertisement
- router advertisement
- neighbor solicitation
- echo request
neighbor advertisement
neighbor solicitation
Which device supports the use of SPAN to enable monitoring of malicious activity?
- Cisco IronPort
- Cisco Security Agent
- Cisco Catalyst switch
- Cisco NAC
Cisco Catalyst switch