Module 4 Protecting the Organization Quiz Answer CISCO
In this article, i am gone to Share CISCO Introduction to Cybersecurity. | Module 4 Protecting the Organization Quiz Answer
Module 4
Protecting the Organization
Question 1)
Which of the following tools can be used to provide a list of open ports on network devices?
- Ping
- Tracert
- Nmap
- Whois
Question 2)
'Today, there are single security appliances that will solve all the network security needs of an organization.'
Is this statement true or false?
- True
- False
Question 3)
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
- NetFlow
- SIEM
- Nmap
- Snort
Question 4)
What tool can identify malicious traffic by comparing packet contents to known attack signatures?
- Nmap
- NetFlow
- Zenmap
- IDS
Question 5)
Behavior-based analysis involves using baseline information to detect what?
- Risk
- Anomalies
- Backdoors
- Vulnerabilities
Question 6)
What protocol is used to collect information about traffic traversing a network?
- NAT
- Telnet
- NetFlow
- HTTPS
Question 7)
'With careful planning and consideration, some risks can be completely eliminated.'
Is this statement true or false?
- True
- False
Question 8)
What is a security playbook?
- A collection of security alerts, logs and historical data from the network
- A collection of repeatable queries or reports that outline a standardized process for incident detection and response
- A step-by-step guide on how to carry out IT-related procedures
1 Comments
Nice Article dear
ReplyDeletethanks...