CCNA Discovery 1 Chapter 8

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sparkyone
S
Sparkyone
Community Contributor
Quizzes Created: 2 | Total Attempts: 14,417
| Attempts: 195 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. What is a program that gathers personal information from your computer without your permission or knowledge?

Explanation

Spyware is a program that secretly collects personal information from a computer without the user's consent or knowledge. It is designed to monitor a user's online activities, gather sensitive data such as passwords, credit card information, and browsing habits, and transmit this information to third parties. Spyware can be installed through malicious downloads, email attachments, or by exploiting vulnerabilities in software. It poses a significant threat to privacy and can lead to identity theft, financial loss, and other cybercrimes.

Submit
Please wait...
About This Quiz
CCNA Quizzes & Trivia

Welcome to the eighth chapter on our ongoing series of quizzes regarding the Cisco CCNA Discovery program, which provides the experience and theory on networking required for a wide range of career opportunities. Have you learned all there is to learn in this chapter? Let’s find out!

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What are two types of advertising windows that can display when visting a web page? (Choose all that apply)

Explanation

Popup and pop-under are two types of advertising windows that can display when visiting a web page. Popup windows appear in front of the current browser window, overlaying the content, while pop-under windows open behind the current browser window and are only visible when the current window is closed or minimized. Spam, spyware, and adware are not types of advertising windows, but rather refer to unwanted or malicious software.

Submit
3. Where was Ryan when he was making his attack?

Explanation

The correct answer is A or B. This suggests that Ryan could have been either inside or outside the building when he was making his attack. The information provided does not specify his exact location, so both options are possible. It is unclear whether Las Vegas is relevant to the question, as it is not mentioned in the answer choices.

Submit
4. What does a DMZ do?

Explanation

A DMZ (Demilitarized Zone) is a network segment that separates an organization's internal network from an external network, typically the internet. It acts as a buffer zone between the internal network and the outside world, allowing controlled access to specific resources. In the context of the given options, a DMZ allows an outside network to connect to an inside network server. This means that external users or networks can access specific services or servers hosted within the organization's internal network, while still maintaining a level of security and isolation.

Submit
5. Ryan sent 1000's and 1000's of pings to a web server in order to slow it down. What type of attack is he implementing? 

Explanation

Ryan is implementing a DoS (Denial of Service) attack by sending a large number of pings to the web server. This overwhelms the server's resources and causes it to slow down or crash, making it inaccessible to other users. This type of attack aims to disrupt the normal functioning of a system or network by flooding it with excessive traffic.

Submit
6. What are some of the security tools and applications used in securing a network? (Choose all that apply)

Explanation

Updates and Patches, Firewalls, and Anti-Virus are security tools and applications used in securing a network. Updates and Patches help to fix vulnerabilities and bugs in the network's software, ensuring that it is up to date and protected against potential threats. Firewalls act as a barrier between the network and external threats, monitoring and controlling incoming and outgoing network traffic. Anti-Virus software scans and detects malicious software, such as viruses and malware, and removes them from the network, preventing potential damage. These tools work together to enhance the security of a network and protect it from various cyber threats.

Submit
7. What is the website network administrators should report new instances of malware threats?

Explanation

Network administrators should report new instances of malware threats to the website https://forms.us-cert.gov/report.

Submit
8. Darcy is trying to get information over the telephone by pretending to be someone he is not. What kind of attack is Darcy using?

Explanation

Darcy is using pretexting as an attack. Pretexting is a form of social engineering where an attacker creates a false identity or scenario to deceive someone into providing sensitive information. In this case, Darcy is pretending to be someone else over the telephone to obtain information. This tactic is commonly used to gain access to personal or financial information from unsuspecting individuals.

Submit
9. What are some of the signs that a virus, worm, or trojan horse maybe present in your system? (Choose all that apply)

Explanation

The signs that a virus, worm, or trojan horse may be present in your system include unwanted reboots, high CPU usage, active NIC light when sitting idle, and active hard drive light when sitting idle. These signs indicate that there may be malicious activity running in the background, causing the system to behave unusually. Unwanted reboots can be a result of malware trying to gain control of the system. High CPU usage can indicate the presence of a resource-intensive malicious program. The active NIC light and active hard drive light when sitting idle suggest that data is being transmitted or accessed without user intervention, indicating potential malware activity.

Submit
10. What are some of the features that can be included in anti-virus programs? (Choose all that apply)

Explanation

Anti-virus programs are designed to protect computers from various threats. Resident Dynamic Scanning is a feature that continuously scans the system in real-time to detect and remove any viruses or malware. E-mail Checking is another important feature that scans incoming and outgoing emails for any malicious attachments or links. Scheduled Scans allow users to set up automatic scans at specific times to ensure regular system checks for viruses. Therefore, the correct answer includes these features as they are essential components of anti-virus programs.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2009
    Quiz Created by
    Sparkyone
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is a program that gathers personal information from your computer...
What are two types of advertising windows that can display when...
Where was Ryan when he was making his attack?
What does a DMZ do?
Ryan sent 1000's and 1000's of pings to a web server in order to...
What are some of the security tools and applications used in securing...
What is the website network administrators should report new instances...
Darcy is trying to get information over the telephone by...
What are some of the signs that a virus, worm, or trojan horse maybe...
What are some of the features that can be included in anti-virus...
Alert!

Advertisement