Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 8. Security Solutions > Questions and Answers

Questions and Answers

1.A ______ is a computer that has been compromised and is now under the control of the network attacker.
  1. Virus

  2. Trojan

  3. Zombie or botnet client

  4. Server

  5. PC

2.True or false: A virus can be downloaded to the user station only from the Internet.
  1. True

  2. False

3.True or false: Viruses require a host to attach to and execute, and worms do not require a host.
  1. True

  2. False

4.What kind of attack sends ICMP ping requests to a directed broadcast address where the forged source address of the request is the target of the attack and the recipients of the directed broadcast ping request respond to the request and flood the target’s network?
  1. Ping of death

  2. ICMP unreachables

  3. Teardrop attack

  4. Land attack

  5. Smurf attack

5.What kind of attack sends UDP packets to the broadcast address?
  1. Ping of death

  2. ICMP unreachables

  3. Teardrop attack

  4. Land attack

  5. Smurf attack

  6. Fraggle attack

6.True or false: The key difference between a DoS and DDoS attack is the type of packets used in a DDoS attack.
  1. True

  2. False

7.A _____ attack is a form of DoS attack that relies on the assumption that the number of programs and processes that may be simultaneously executed on a computer has a limit.
  1. Fork bomb

  2. Trojan

  3. Land attack

  4. Pulsing zombie

  5. Nuke

8.DDoS mitigation involves which of the following functions?
  1. Detecting, diverting, analyzing and filtering, forwarding

  2. Detecting, forwarding

  3. Detecting, filtering, forwarding

  4. Detecting, diverting, analyzing, dropping

  5. Detecting, diverting, filtering, forwarding

9.Which of the following can be used to prevent the theft of information during or after a remote access session?
  1. Cisco Secure Agent

  2. Cisco Secure ACS

  3. Cisco ASA

  4. Cisco Secure Desktop


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint