Cisco – Introduction to Cybersecurity Chapter 4 Quiz Exam Answers 2021
Question 1: Which tool can identify malicious traffic by comparing packet contents to known attack signatures?
- Nmap
- Netflow
- Zenmap
- IDS
Question 2: Fill in the blank.A ______ is a group of compromised or hacked computers (bots) controlled by an individual with malicious intent.
Answer: Botnet
Question 3: Refer to the exhibit. Rearrange the letters to fill in the blank.The behavior-based analysis involves using baseline information to detect _______ that could indicate an attack.
Answer: Anomaly
Question 4: Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
- Netflow
- Snort
- Nmap
- SIEM
Question 5: What is the last stage of the Cyber Kill Chain framework?
- remote control of the target device
- creation of malicious payload
- gathering target information
- malicious action
Question 6: Fill in the blank.Any device that controls or filters traffic going in or out of the network is known as a ____________.
Answer: Firewall
Question 7: What type of attack disrupts services by overwhelming network devices with bogus traffic?
- brute force
- port scans
- zero-day
- DDoS
Question 8: Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?
- HTTPS
- Telnet
- NAT
- NetFlow