CCNA 1 Chapter 8

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lytayquize
L
Lytayquize
Community Contributor
Quizzes Created: 5 | Total Attempts: 6,634
Questions: 21 | Attempts: 844

SettingsSettingsSettings
CCNA 1 Chapter 8 - Quiz

These quiz is prepared to take for whom want to measure the knowledge and ability only. This is not the only way to cheat other but it can improve your knowledge base on what you have learn.


Questions and Answers
  • 1. 

    Identify three techniques used in social engineering. (Choose three.)

    • A.

      Fishing

    • B.

      Vishing

    • C.

      Phishing

    • D.

      Spamming

    • E.

      Pretexting

    Correct Answer(s)
    B. Vishing
    C. Phishing
    E. Pretexting
    Explanation
    Vishing, phishing, and pretexting are three techniques commonly used in social engineering. Vishing refers to the act of using voice communication, such as phone calls, to deceive individuals and gather sensitive information. Phishing involves sending fraudulent emails or messages to trick recipients into revealing personal data or login credentials. Pretexting involves creating a false scenario or pretext to manipulate individuals into providing confidential information. These techniques exploit human vulnerabilities and trust to gain unauthorized access or manipulate individuals for malicious purposes.

    Rate this question:

  • 2. 

    During a pretexting event, how is a target typically contacted?

    • A.

      By e-mail

    • B.

      By phone

    • C.

      In person

    • D.

      Through another person

    Correct Answer
    B. By phone
    Explanation
    During a pretexting event, a target is typically contacted by phone. This method allows the attacker to establish a more personal and convincing interaction, as they can use voice manipulation techniques and social engineering tactics to gain the target's trust and obtain sensitive information. Email or other forms of communication may lack the same level of immediacy and personal touch that a phone call provides, making it a less effective choice for pretexting.

    Rate this question:

  • 3. 

    While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?

    • A.

      Worm

    • B.

      Virus

    • C.

      Trojan horse

    • D.

      Denial of service

    Correct Answer
    C. Trojan horse
    Explanation
    A Trojan horse attack occurred in this scenario. A Trojan horse is a type of malicious software that disguises itself as a legitimate program or file, tricking users into installing it. In this case, the user unknowingly opened a box claiming a prize, which installed a program on their computer. This program allowed an intruder to gain access to the computer and retrieve personal information. Unlike viruses or worms, Trojan horses do not replicate themselves, but instead rely on user interaction to be installed.

    Rate this question:

  • 4. 

    What is a major characteristic of a Worm?

    • A.

      Malicious software that copies itself into other executable programs

    • B.

      Tricks users into running the infected software

    • C.

      A set of computer instructions that lies dormant until triggered by a specific event

    • D.

      Exploits vulnerabilities with the intent of propagating itself across a network

    Correct Answer
    D. Exploits vulnerabilities with the intent of propagating itself across a network
    Explanation
    A major characteristic of a worm is that it exploits vulnerabilities with the intent of propagating itself across a network. Unlike viruses, worms do not require a host program to attach themselves to and can spread independently. They take advantage of security weaknesses in computer systems to rapidly replicate and spread from one device to another. This characteristic makes worms a significant threat to network security as they can quickly infect multiple devices and cause widespread damage.

    Rate this question:

  • 5. 

    A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

    • A.

      Trojan horse

    • B.

      Brute force

    • C.

      Ping of death

    • D.

      SYN flooding

    Correct Answer
    D. SYN flooding
    Explanation
    SYN flooding is the type of attack that occurred. In a SYN flood attack, the attacker sends a flood of TCP SYN packets with invalid source-IP addresses to the server, requesting a connection. The server then tries to respond to all these requests, keeping its resources busy and resulting in valid requests being ignored. This type of attack can lead to denial of service as the server becomes overwhelmed with the flood of requests.

    Rate this question:

  • 6. 

    What type of advertising is typically annoying and associated with a specific website that is being visited?

    • A.

      Adware

    • B.

      Popups

    • C.

      Spyware

    • D.

      Tracking cookies

    Correct Answer
    B. Popups
    Explanation
    Popups are a type of advertising that is typically annoying and associated with a specific website that is being visited. These are small windows that appear on top of the website content, usually displaying advertisements or promotional messages. Popups interrupt the user's browsing experience and can be perceived as intrusive and disruptive. They often require the user to close them manually before continuing with their intended actions on the website.

    Rate this question:

  • 7. 

    What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?

    • A.

      Brute force

    • B.

      Spam

    • C.

      Spyware

    • D.

      Tracking cookies

    Correct Answer
    B. Spam
    Explanation
    Spam is a widely distributed approach to marketing on the Internet that involves sending unsolicited messages to as many individual users as possible via IM or email. It is considered a form of mass advertising that aims to reach a large audience, often with the intention of promoting products or services. Spam is often seen as intrusive and unwanted by recipients, and it is commonly associated with unsolicited emails that can clog up inboxes and be a nuisance to users.

    Rate this question:

  • 8. 

    What part of the security policy states what applications and usages are permitted or denied?

    • A.

      Identification and authentication

    • B.

      Remote access

    • C.

      Acceptable use

    • D.

      Incident handling

    Correct Answer
    C. Acceptable use
    Explanation
    The correct answer is "acceptable use." The acceptable use policy is a part of the security policy that outlines what applications and usages are allowed or prohibited within an organization. It sets guidelines for employees regarding the proper and acceptable use of company resources, such as computers, networks, and internet access. This policy helps to ensure that employees understand their responsibilities and the boundaries of acceptable behavior, ultimately promoting a secure and productive work environment.

    Rate this question:

  • 9. 

    Which statement is true regarding anti-virus software?

    • A.

      Only e-mail programs need to be protected.

    • B.

      Only hard drives can be protected.

    • C.

      Only after a virus is known can an anti-virus update be created for it.

    • D.

      Only computers with a direct Internet connection need it.

    Correct Answer
    C. Only after a virus is known can an anti-virus update be created for it.
    Explanation
    Anti-virus software is designed to detect and remove viruses from computer systems. In order to create an update for a specific virus, the virus must first be identified and analyzed by security experts. Once the virus is known, the anti-virus software developers can create an update that includes the necessary information to detect and remove that specific virus. This update can then be distributed to users, allowing them to protect their systems from the newly identified virus. Therefore, the statement "Only after a virus is known can an anti-virus update be created for it" is true.

    Rate this question:

  • 10. 

    Which two statements are true concerning anti-spam software? (Choose two.)

    • A.

      Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.

    • B.

      When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.

    • C.

      Installing anti-spam software should be a low priority on the network.

    • D.

      Even with anti-spam software installed, users should be careful when opening e-mail attachments.

    • E.

      Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.

    Correct Answer(s)
    B. When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
    D. Even with anti-spam software installed, users should be careful when opening e-mail attachments.
    Explanation
    Anti-spam software can sometimes incorrectly classify legitimate emails as spam, which can result in important messages being missed. Therefore, it is true that when anti-spam software is loaded, legitimate emails may be classified as spam by mistake. Additionally, even with anti-spam software installed, users should still exercise caution when opening email attachments, as the software may not catch all malicious files.

    Rate this question:

  • 11. 

    What term is used to describe a dedicated hardware device that provides firewall services?

    • A.

      Server-based

    • B.

      Integrated

    • C.

      Personal

    • D.

      Appliance-based

    Correct Answer
    D. Appliance-based
    Explanation
    An appliance-based firewall refers to a dedicated hardware device that is specifically designed to provide firewall services. Unlike server-based or integrated firewalls, which are software-based solutions, appliance-based firewalls are standalone devices that offer robust security features and are often more efficient in handling high network traffic. They are commonly used in network environments where a high level of security is required, offering advanced protection against unauthorized access and malicious activities.

    Rate this question:

  • 12. 

    Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?

    • A.

      SPI

    • B.

      DMZ

    • C.

      ISR

    • D.

      ISP

    Correct Answer
    B. DMZ
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that acts as a buffer zone between the internal network and the external network. It is accessible by both internal and external host devices, making it a suitable answer for this question. The other options, SPI (Stateful Packet Inspection), ISR (Integrated Services Router), and ISP (Internet Service Provider), do not specifically refer to an area of the network that is accessible by both internal and external devices.

    Rate this question:

  • 13. 

    Which statement is true about port forwarding within a Linksys integrated router?

    • A.

      Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.

    • B.

      Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.

    • C.

      Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.

    • D.

      Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

    Correct Answer
    A. Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
    Explanation
    Port forwarding within a Linksys integrated router allows only external traffic that is intended for specific internal ports to pass through. All other traffic is blocked or denied. This means that the router only allows incoming connections to specific ports on the internal network, while blocking all other incoming traffic. This is a common security measure to protect the internal network from unauthorized access and potential threats.

    Rate this question:

  • 14. 

    To which part of the network does the wireless access point part of a Linksys integrated router connect?

    • A.

      DMZ

    • B.

      External

    • C.

      Internal

    • D.

      A network other than the wired network

    Correct Answer
    C. Internal
    Explanation
    The wireless access point part of a Linksys integrated router connects to the internal part of the network. This means that it is responsible for providing wireless connectivity to devices within the network, allowing them to access resources and communicate with each other. The internal network is typically the private network within a home or office, where devices such as computers, smartphones, and printers are connected. By connecting to the internal network, the wireless access point ensures that these devices can access the internet and other network resources wirelessly.

    Rate this question:

  • 15. 

    Refer to the graphic. What is the purpose of the Internet Filter option of Filter IDENT (Port 113. on the Linksys integrated router?

    • A.

      To require a user ID and password to access the router

    • B.

      To prevent outside intruders from attacking the router through the Internet

    • C.

      To require a pre-programmed MAC address or IP address to access the router

    • D.

      To disable tracking of internal IP addresses so they cannot be spoofed by outside devices

    Correct Answer
    B. To prevent outside intruders from attacking the router through the Internet
    Explanation
    The purpose of the Internet Filter option of Filter IDENT (Port 113) on the Linksys integrated router is to prevent outside intruders from attacking the router through the Internet. This option filters out any incoming traffic on Port 113, which is commonly used for the IDENT protocol. By blocking access to this port, the router is protected from potential attacks and unauthorized access attempts from external sources.

    Rate this question:

  • 16. 

    What statement is true about security configuration on a Linksys integrated router?

    • A.

      A DMZ is not supported.

    • B.

      The router is an example of a server-based firewall.

    • C.

      The router is an example of an application-based firewall.

    • D.

      Internet access can be denied for specific days and times.

    Correct Answer
    D. Internet access can be denied for specific days and times.
    Explanation
    The correct answer is "Internet access can be denied for specific days and times." This means that the security configuration on a Linksys integrated router allows the user to restrict or block internet access during certain days and times. This feature can be useful for controlling internet usage and ensuring that access is only available during specific periods. It is important for users to be able to have control over when internet access is allowed or denied for security and management purposes.

    Rate this question:

  • 17. 

    What environment would be best suited for a two-firewall network design?

    • A.

      A large corporate environment

    • B.

      A home environment with 10 or fewer hosts

    • C.

      A home environment that needs VPN access

    • D.

      A smaller, less congested business environment

    Correct Answer
    A. A large corporate environment
    Explanation
    A large corporate environment would be best suited for a two-firewall network design because it provides enhanced security and protection for the organization's sensitive data and resources. With a large number of users and devices, there is a higher risk of unauthorized access and attacks. Implementing two firewalls can create an additional layer of defense by segregating the network into different security zones and enforcing stricter access control policies. This design ensures that even if one firewall is compromised, the second firewall can still provide protection and prevent unauthorized access to critical assets.

    Rate this question:

  • 18. 

    What is one function that is provided by a vulnerability analysis tool?

    • A.

      It provides various views of possible attack paths.

    • B.

      It identifies missing security updates on a computer.

    • C.

      It identifies wireless weak points such as rogue access points.

    • D.

      It identifies all network devices on the network that do not have a firewall installed.

    • E.

      It identifies MAC and IP addresses that have not been authenticated on the network.

    Correct Answer
    B. It identifies missing security updates on a computer.
    Explanation
    A vulnerability analysis tool is designed to identify vulnerabilities and weaknesses in a system or network. One of the functions provided by such a tool is to identify missing security updates on a computer. This is important because outdated software or missing patches can create security vulnerabilities that can be exploited by attackers. By identifying these missing updates, the tool helps ensure that the system is up to date with the latest security patches, reducing the risk of potential attacks.

    Rate this question:

  • 19. 

    Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.

    • A.

      Periodically update anti-virus software.

    • B.

      Be aware of normal network traffic patterns.

    • C.

      Periodically update the host operating sys

    • D.

      Activate the firewall on a Linksys integrated router.

    • E.

      Disable the wireless network when a vulnerability analysis is being performed.

    Correct Answer
    E. Disable the wireless network when a vulnerability analysis is being performed.
    Explanation
    Disabling the wireless network when a vulnerability analysis is being performed is not a best practice for wired and wireless security. Vulnerability analysis is typically conducted to identify potential weaknesses in the network, and disabling the wireless network during this process would prevent the analysis from accurately assessing the security of the wireless network. It is important to keep the wireless network active during vulnerability analysis to identify any vulnerabilities and take appropriate measures to mitigate them.

    Rate this question:

  • 20. 

    What best practice relates to wireless access point security?

    • A.

      Activation of a popup stopper

    • B.

      A change of the default IP address

    • C.

      An update in the antivirus software definitions

    • D.

      Physically securing the cable between the access point and client

    Correct Answer
    B. A change of the default IP address
    Explanation
    A best practice for wireless access point security is to change the default IP address. This is important because many access points come with a default IP address, which is known to hackers and can make the network vulnerable to attacks. By changing the default IP address, it becomes harder for unauthorized users to gain access to the network. This is a simple but effective measure to enhance the security of the wireless access point.

    Rate this question:

  • 21. 

    Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?

    • A.

      It prevents packets based on the application that makes the request.

    • B.

      It allows packets based on approved internal MAC or IP addresses.

    • C.

      It requires that packets coming into the router be responses to internal host requests.

    • D.

      It translates an internal address or group of addresses into an outside, public address.

    Correct Answer
    C. It requires that packets coming into the router be responses to internal host requests.
    Explanation
    The SPI Firewall Protection option Enabled in the Linksys Security menu requires that packets coming into the router be responses to internal host requests. This means that the firewall will only allow incoming packets that are in response to a request made by a device within the internal network. It helps to prevent unauthorized access and ensures that only legitimate responses are allowed through the firewall.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 20, 2010
    Quiz Created by
    Lytayquize
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.