Let’s travel together.

CCNA Cybersecurity Operations (Vesion 1.1) – CyberOps Chapter 6 Exam Answers

  1. A network administrator detects unknown sessions involving port 21 on the network. What could be causing this security breach?
    • An FTP Trojan horse is executing. *
    • A reconnaissance attack is occurring.
    • A denial-of-service attack is occurring.
    • Cisco Security Agent is testing the network.
  2. Which example illustrates how malware might be concealed?
    • A botnet of zombies carry personal information back to the hacker.
    • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
    • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
    • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware. *
  3. Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?
    • Worm
    • Virus *
    • Proxy Trojan horse
    • Denial-of-service Trojan horse
  4. What type of malware has the primary objective of spreading across the network?
    • virus
    • worm
    • Trojan horse
    • botnet
  5. Why would a rootkit be used by a hacker?
    • to gain access to a device without being detected
    • to do reconnaissance
    • to reverse engineer binary files
    • to try to guess a password
  6. Which type of hacker is motivated to protest against political and social issues?
    • cybercriminal
    • script kiddie
    • vulnerability broker
    • hacktivist
  7. What is a characteristic of a Trojan horse as it relates to network security?
    • Extreme quantities of data are sent to a particular network device interface.
    • An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
    • Too much information is destined for a particular memory block, causing additional memory areas to be affected.
    • Malware is contained in a seemingly legitimate executable program.
  8. What is a botnet?
    • a group of web servers that provide load balancing and fault tolerance
    • an online video game intended for multiple players
    • a network that allows users to bring their own technology
    • a network of infected computers that are controlled as a group
  9. Which type of Trojan horse security breach uses the computer of the victim as the source device to launch other attacks?
    • DoS
    • FTP
    • data-sending
    • proxy
  10. What is the primary goal of a DoS attack?
    • to prevent the target server from being able to handle additional requests
    • to scan the data on the target server
    • to facilitate access to external networks
    • to obtain all addresses in the address book within the server
  11. Which tool is used to provide a list of open ports on network devices?
    • Nmap *
    • Ping
    • Whois
    • Tracert
  12. Which type of attack allows an attacker to use a brute-force approach?
    • Packet sniffing
    • Social engineering
    • Denial of service
    • Password cracking *
  13. Which term is used to describe the act of sending an email message in an attempt to divulge sensitive information from someone?
    • Phishing *
    • DoS attack
    • Hacktivisim
    • Script kiddie
  14. What is the significant characteristic of worm malware?
    • A worm can execute independently of the host system. *
    • Worm malware disguises itself as legitimate software.
    • A worm must be triggered by an event on the host system.
    • Once installed on a host system, a worm does not replicate itself.
  15. What is a main purpose of launching an access attack on network systems?
    • to prevent other users from accessing the system
    • to scan for accessible networks
    • to gather information about the network
    • to retrieve data
  16. What causes a buffer overflow?
    • launching a security countermeasure to mitigate a Trojan horse
    • attempting to write more data to a memory location than that location can hold
    • sending repeated connections such as Telnet to a particular device, thus denying other data sources
    • sending too much information to two or more interfaces of the same device, thereby causing dropped packets
    • downloading and installing too many software updates at one time
  17. In what way are zombies used in security attacks?
    • They are infected machines that carry out a DDoS attack.
    • They are maliciously formed code segments used to replace legitimate applications.
    • They target specific individuals to gain corporate or personal information.
    • They probe a group of machines for open ports to learn which services are running
  18. What are two evasion methods used by hackers? (Choose two.)
    • scanning
    • encryption
    • access attack
    • phishing
    • resource exhaustion
  19. What are two purposes of launching a reconnaissance attack on a network? (Choose two.)
    • to retrieve and modify data
    • to scan for accessibility
    • to escalate access privileges
    • to prevent other users from accessing the system
    • to gather information about the network and devices
  20. What are three techniques used in social engineering attacks? (Choose three.)
    • vishing
    • phishing
    • pretexting
    • buffer overflow
    • man-in-the-middle
    • sending junk email
  21. An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?
    • port redirection
    • trust exploitation
    • buffer overflow
    • man in the middle
  22. A user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.)
    • The computer emits a hissing sound every time the pencil sharpener is used.
    • The computer freezes and requires reboots.
    • No sound emits when an audio CD is played.
    • The computer gets increasingly slower to respond.
    • The computer beeps once during the boot process.
  23. A company pays a significant sum of money to hackers in order to regain control of an email and data server. Which type of security attack was used by the hackers?
    • DoS
    • spyware
    • Trojan horse
    • ransomware
  24. What is the term used to describe an email that is targeting a specific person employed at a financial institution?
    • spam
    • spyware
    • vishing
    • target phishing
    • spear phishing
  25. Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?
    • packet sniffer attack
    • denial of service attack
    • buffer overflow attack
    • brute-force attack
    • port redirection attack
    • IP spoofing attack
  26. Which type of security attack would attempt a buffer overflow?
    • ransomware
    • reconnaissance
    • DoS
    • scareware
  27. What is a significant characteristic of virus malware?
    • Virus malware is only distributed over the Internet.
    • Once installed on a host system, a virus will automatically propagate itself to other systems.
    • A virus is triggered by an event on the host system.
    • A virus can execute independently of the host system
  28. A senior citizen receives a warning on the computer that states that the operating system registry is corrupt and to click a particular link to repair it. Which type of malware is being used to try to create the perception of a computer threat to the user?
    • DoS
    • scareware
    • phishing
    • adware
  29. What is the motivation of a white hat attacker?
    • fine tuning network devices to improve their performance and efficiency
    • taking advantage of any vulnerability for illegal personal gain
    • studying operating systems of various platforms to develop a new system
    • discovering weaknesses of networks and systems to improve the security level of these systems
  30. What is a ping sweep?
    • a network scanning technique that indicates the live hosts in a range of IP addresses.
    • a query and response protocol that identifies information about a domain, including the addresses that are assigned to that domain.
    • a software application that enables the capture of all network packets that are sent across a LAN.
    • a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services
  31. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
    • Trojan
    • vishing
    • phishing
    • backdoor
  32. What are the three major components of a worm attack? (Choose three.)
    • an enabling vulnerability
    • a propagation mechanism
    • a payload
    • a probing mechanism
    • a penetration mechanism
    • an infecting vulnerability
  33. Which security threat installs on a computer without the knowledge of the user and then monitors computer activity?
    • spyware
    • viruses
    • worms
    • adware
0 0 votes
Article Rating
Notify of

Inline Feedbacks
View all comments
Would love your thoughts, please comment.x