Module 2 Attacks, Concepts and Techniques Quiz Answer | CISCO

Module 2 Attacks, Concepts and Techniques Quiz Answer  CISCO

Module 2 Attacks, Concepts and Techniques Quiz Answer CISCO


In this article, i am gone to Share CISCO Introduction to Cybersecurity. Module 2 Attacks, Concepts and Techniques Quiz Answer


Question 1)

What is the purpose of a rootkit?

  • To deliver advertisements without user consent
  • To masquerade as a legitimate program
  • To gain privileged access to a device while concealing itself
  • To replicate itself independently of any other programs


Question 2)

Which of the following examples illustrates how malware might be concealed?

  • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
  • A botnet of zombies carry personal information back to the hacker
  • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors


Question 3)

What type of attack allows an attacker to use a brute-force approach?

  • Packet sniffing
  • Social engineering
  • Password cracking
  • Denial of service


Question 4)

What is the most common goal of search engine optimization (SEO) poisoning?

  • To build a botnet of zombies
  • To overwhelm a network device with maliciously formed packets
  • To trick someone into installing malware or divulging personal information
  • To increase web traffic to malicious sites


Question 5)

A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?

  • A fix
  • A patch
  • An install
  • A hack


Question 6)

What do you call a program written to take advantage of a known security vulnerability?

  • An exploit
  • Antivirus
  • A firewall
  • A software update


Question 7)

Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?

  • Buffer overflow
  • Non-validated input
  • Race condition
  • Access control problem


Question 8)

What is a miner?

  • A type of blockchain
  • A person that solves complex mathematical puzzles to verify a transaction
  • An algorithm that predicts the next block of a chain
  • A computer that processes and verifies a blockchain transaction








Post a Comment

0 Comments