Jumat, 07 Januari 2011

CCNA Quiz Chapter8 Discovery1


  1. Drag the network threat on the left to the definition on the right
Data loss                              destroying data on a hard drive
Data manipulation           changing data for personal gain
Disruption of service      overloading a server to reduce its performance
Information theft            stealing data on a hard drive to gain a competitive advantage
Identity theft     stealing information to impersonate someone and usually obtain credit
  1. How does a phisher typically contact a victim?
>> by e-mail
  1. A file is downloaded from the Internet. After the user opens the downloaded file, the user’s hard drive crashes and all information on the computer is lost. What type of attack occurred?
>> virus
  1. In rapid succession, an intruder tries a large number of possibilities to guess passwords. As a result, other users on the network are locked out. What type of attack occurred?
>> brute force
  1. What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
>> spyware
  1. A network administrator is troubleshooting a computer that is operating strangely. It boots slowly, programs will not load, and the keyboard responds very slowly. What is the best action for the administrator to take?
>> boot the PC and run anti-virus and anti-spyware application from an external drive
  1. Drag the term on the left to the best description on the right
>>
Stateful packet inspection           Can look inside the packet up through layer 7
Website filtering                              allows or denies access based on a URL
Simple packet filtering                   allows or denies access based on an IP or MAC address
NAT                                                       keeps external users from knowing the IP address used inside the network
  1. Drag the term on the left to the definition on the right
>>
Integrated firewall                          a feature of a network device such as a router
Personal firewall                              an application designed to protect a home PC
Appliance-based firewall              a device that has the sole function of being a firewall
Server-based firewall                     an application designed to protect the enterprise network
  1. What are three security features commonly found on an ISR? (Choose three)
>> DMZ, NAT, SPI
  1. What are two purpose of a DMZ (Choose two)
>>
To create a network area that allows internal resources, such as a web server, to be accessed by external users
To establish a network area where network resources can be shared by both internal and external users

0 komentar:

Posting Komentar