CCNA Discovery 1 Chapter 8

10 Questions | Total Attempts: 166

SettingsSettingsSettings
Please wait...
CCNA Discovery Quizzes & Trivia

Welcome to the eighth chapter on our ongoing series of quizzes regarding the Cisco CCNA Discovery program, which provides the experience and theory on networking required for a wide range of career opportunities. Have you learned all there is to learn in this chapter? Let’s find out!


Questions and Answers
  • 1. 
    What are some of the security tools and applications used in securing a network? (Choose all that apply)
    • A. 

      Updates and Patches

    • B. 

      Firewalls

    • C. 

      DMZ

    • D. 

      E-mail Checking

    • E. 

      Anti-Virus

  • 2. 
    Ryan sent 1000's and 1000's of pings to a web server in order to slow it down. What type of attack is he implementing? 
    • A. 

      Ping of Death

    • B. 

      DDoS

    • C. 

      DoS

    • D. 

      Worm

    • E. 

      Trojan Horse

  • 3. 
    Where was Ryan when he was making his attack?
    • A. 

      Inside the building

    • B. 

      Outside the building

    • C. 

      A or D

    • D. 

      Las Vegas

    • E. 

      A or B

  • 4. 
    What is a program that gathers personal information from your computer without your permission or knowledge?
    • A. 

      Cookie

    • B. 

      Ad-Ware

    • C. 

      Virus

    • D. 

      Spyware

    • E. 

      Worm

  • 5. 
    What are two types of advertising windows that can display when visting a web page? (Choose all that apply)
    • A. 

      Spam

    • B. 

      Spyware

    • C. 

      Popup

    • D. 

      Adware

    • E. 

      Pop-under

  • 6. 
    What are some of the signs that a virus, worm, or trojan horse maybe present in your system? (Choose all that apply)
    • A. 

      Unwanted Reboot

    • B. 

      CPU usage very high

    • C. 

      Active NIC light when sitting idle

    • D. 

      Resident Dynamic Scanning

    • E. 

      Active hard drive light when sitting idle

  • 7. 
    Darcy is trying to get information over the telephone by pretending to be someone he is not. What kind of attack is Darcy using?
    • A. 

      Phising

    • B. 

      Vishing

    • C. 

      Pretexting

    • D. 

      DDoS

    • E. 

      Identity Theft

  • 8. 
    What are some of the features that can be included in anti-virus programs? (Choose all that apply)
    • A. 

      Spam Filter

    • B. 

      Resident Dynamic Scanning

    • C. 

      E-mail Checking

    • D. 

      Popup Blockers

    • E. 

      Scheduled Scans

  • 9. 
    What is the website network administrators should report new instances of malware threats?
    • A. 

      Http://forms.us-cert.org/report

    • B. 

      Http://forms.us-cert.gov/report

    • C. 

      Https://forms.uscert.gov/report

    • D. 

      Https://forms.us-cert.gov/report

    • E. 

      Https://forms.us-cert.org/report

  • 10. 
    What does a DMZ do?
    • A. 

      Port Forwarding

    • B. 

      Allows an outside network to connect to an inside network server

    • C. 

      Allows an inside network to connect to an inside network server

    • D. 

      Demilitarizes Packets

    • E. 

      Port Blocking

Back to Top Back to top