Introduction to Cybersecurity 2.1 Chapter 4 Quiz Simulator Online
ITC 2.1 Chapter 4 Quiz Simulator Online | |
---|---|
Time | 60 minutes |
Questions | 8 |
SHOW ANSWERS |
Leaderboard: ITC v2.1 Chapter 4 Quiz Simulator
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
ITC v2.1 Chapter 4 Quiz Simulator
Quiz-summary
0 of 8 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
Information
ITC v2.1 Chapter 4 Quiz Simulator
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 8 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- Answered
- Review
-
Question 1 of 8
1. Question
1 pointsWhich tool can identify malicious traffic by comparing packet contents to known attack signatures?
Correct
Incorrect
Hint
Explanation:
An IDS, or intrusion detection system, is a device that can scan packets and compare them to a set of rules or attack signatures. If the packets match attack signatures, then the IDS can create an alert and log the detection. -
Question 2 of 8
2. Question
1 pointsFill in the blank.
- A (botnet, BOTNET) is a group of compromised or hacked computers (bots) controlled by an individual with malicious intent.
Correct
Incorrect
Hint
Explanation:
A compromised or hacked computer that is controlled by a malicious individual or group is known as a bot. A group of these hacked computers under the control of a malicious individual or group is known as a botnet. -
Question 3 of 8
3. Question
1 pointsRefer to the exhibit.
Rearrange the letters to fill in the blank.
- Behavior-based analysis involves using baseline information to detect (anomaly, Anomalies, Anomaly, anomalies) that could indicate an attack.
Correct
Incorrect
Hint
Explanation:
Behavior-based security uses informational context to detect anomalies in the network.
-
Question 4 of 8
4. Question
1 pointsWhich tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
Correct
Incorrect
Hint
Explanation:
Snort is an open source intrusion protection system (IPS) that is capable of performing real-time traffic and port analysis, packet logging, content searching and matching, as well as detecting probes, attacks, port scans, fingerprinting, and buffer overflow attacks. -
Question 5 of 8
5. Question
1 pointsWhat is the last stage of the Cyber Kill Chain framework?
Correct
Incorrect
Hint
Explanation:
The Cyber Kill Chain describes the phases of a progressive cyberattack operation. The phases include the following:
*Reconnaissance
*Weaponization
*Delivery
*Exploitation
*Installation
*Command and control
*Actions on objectives
In general, these phases are carried out in sequence. However, during an attack, several phases can be carried out simultaneously, especially if multiple attackers or groups are involved. -
Question 6 of 8
6. Question
1 pointsFill in the blank.
- Any device that controls or filters traffic going in or out of the network is known as a (firewall, FIREWALL) .
Correct
Incorrect
Hint
Explanation:
A firewall is a network device used to filter inbound or outbound traffic or both. -
Question 7 of 8
7. Question
1 pointsWhat type of attack disrupts services by overwhelming network devices with bogus traffic?
Correct
Incorrect
Hint
Explanation:
DDoS, or distributed denial of service, attacks are used to disrupt service by overwhelming network devices with bogus traffic. -
Question 8 of 8
8. Question
1 pointsWhich protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?
Correct
Incorrect
Hint
Explanation:
NetFlow is used both to gather details about the traffic that is flowing through the network, and to report it to a central collector.