You are on page 1of 6

Security Threats and Vulnerabilities

1.
What kind of threat is described when a threat actor sends you a virus that can reformat your hard
drive?

data loss or manipulation


disruption of service
identify theft
information theft
2. What kind of threat is described when a threat actor makes illegal online purchases using stolen
credit information?

data loss or manipulation


disruption of service
identify theft
information theft
3. What kind of threat is described when a threat actor prevents legal users from accessing data
services?

data loss or manipulation


disruption of service
identify theft
information theft
4. What kind of threat is described when a threat actor steals scientific research data?

data loss or manipulation


disruption of service
identify theft
information theft
5. What kind of threat is described when a threat actor overloads a network to deny other users network
access?

data loss or manipulation


disruption of service
identify theft
information theft
6. What kind of threat is described when a threat actor alters data records?

data loss or manipulation


disruption of service
identify theft
information theft
7. What kind of threat is described when a threat actor is stealing the user database of a
company?
data loss or manipulation
disruption of service
identify theft
information theft
8. What kind of threat is described when a threat actor impersonates another person to obtain credit
information about that person?

data loss or manipulation


disruption of service
identify theft
information theft

1. Angela, an IT staff member at ACME Inc., notices that communication with the company’s web
server is very slow. After investigating, she determines that the cause of the slow response is a
computer on the internet sending a very large number of malformed web requests to ACME’S web
server. What type of attack is described in this scenario?

access attack
denial of service (DoS) attack
malware attack reconnaissance
attack
2. George needed to share a video with a co-worker. Because of the large size of the video file, he
decided to run a simple FTP server on his workstation to serve the video file to his co-
worker. To make things easier, George created an account with the simple password of “file” and
provided it to his co-worker on Friday. Without the proper security measures or a strong password,
the IT staff was not surprised to learn on Monday that George’s workstation had been compromised
and was trying to upload work related documents to the internet. What type of attack is described in
this scenario?

access attack
denial of service (DoS) attack
malware attack reconnaissance
attack
3. Jeremiah was browsing the internet from his personal computer when a random website offered
a free program to clean his system. After the executable was downloaded and running, the
operating system crashed. Crucial operating system related files had been corrupted and
Jeremiah’s computer required a full disk format and operating system re- installation. What type
of attack is described in this scenario?

access attack
denial of service (DoS) attack
malware attack reconnaissance
attack
4. Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could
not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder.
Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use.
Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in
this scenario?

access attack
denial of service (DoS) attack
malware attack
reconnaissance attack
5. A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to
this computer for over 60 days. Now the print server is operating slowly, and sending a high
number of malicious packets to its NIC. What type of attack is described in this scenario?

access attack
denial of service (DoS) attack
malware attack reconnaissance
attack
6. Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs
generated by the firewall. A handful of IP addresses on the internet were sending malformed packets
to several different IP addresses, at several different random port numbers inside ACME Inc. What
type of attack is described in this scenario?

access attack
denial of service (DoS) attack
malware attack reconnaissance
attack

1. Which device controls traffic between two or more networks to help prevent unauthorized access?

AAA Server
firewall
ESA/WSA
IPS
2. Which device is used by other network devices to authenticate and authorize management access?

AAA Server
firewall
ESA/WSA
IPS
3. Which backup policy consideration is concerned with using strong passwords to protect the backups
and for restoring data?

frequency
storage
security
validation
4. This zone is used to house servers that should be accessible to outside users.

inside
outside
internet
DMZ
5. Which is appropriate for providing endpoint security?

a AAA server
antivirus software
a server-based firewall
an ESA/WSA

Network Security Fundamentals


1. Which component is designed to protect against unauthorized communications to and from a
computer?

antimalware
security center
port scanner
antivirus
firewall
2. Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed
login attempts within 10 seconds?

RouterA(config)# login block-for 2 attempts 30 within 10


RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 10 within 2
RouterA(config)# login block-for 30 attempts 2 within 10
3. What is the purpose of the network security accounting function?

to require users to prove who they are to


keep track of the actions of a user
to provide challenge and response questions
to determine which resources a user can access
4. What type of attack may involve the use of tools such as nslookup and fping?

worm attack
denial of service attack
reconnaissance attack
access attack
5. Which benefit does SSH offer over Telnet for remotely managing a router?

connections via multiple VTY lines


authorization
TCP usage
encryption
6. What is one of the most effective security tools available for protecting users from external threats?

patch servers
password encryption techniques
firewalls
router that run AAA services
7. Which type of network threat is intended to prevent authorized users from accessing
resources?

DoS attacks
reconnaissance attacks
access attacks
trust exploitation
8. Which three services are provided by the AAA framework? (Choose three.)

authentication
autobalancing
accounting
automation
autoconfiguration
authorization
9. Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system
being attacked?

Trojan horse social


engineering worm
virus
10. Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What
type of threat does this situation describe?

maintenance
electrical
environmental
configuration
11. What does the term vulnerability mean?

a known target or victim machine


a computer that contains sensitive information
a weakness that makes a target susceptible to an attack a
potential threat that a hacker creates
a method of attack to exploit a target
12. What three configuration steps must be performed to implement SSH access to a router? (Choose
three.)

a password on the console line an


IP domain name
a user account
an enable mode password a
unique hostname
an encrypted password
13. What is the objective of a network reconnaissance attack?

unauthorized manipulation of data


denying access to resources by legitimate users
disabling network systems or services
discovery and mapping of systems
14. For security reasons a network administrator needs to ensure that local computers cannot ping each
other. Which settings can accomplish this task?

firewall settings
smartcard settings
MAC address settings
file system settings
15. A network administrator establishes a connection to a switch via SSH. What characteristic
uniquely describes the SSH connection?

on-site access to a switch through the use of a directly connected PC and a console cable out-of-
band access to a switch through the use of a virtual terminal with password authentication
direct access to the switch through the use of a terminal emulation program remote
access to the switch through the use of a telephone dialup connection remote access
to a switch where data is encrypted during the session

You might also like