Module 4 Protecting the Organization Quiz Answer | CISCO

Module 4 Protecting the Organization Quiz Answer

Module 4 Protecting the Organization Quiz Answer CISCO

In this article, i am gone to Share CISCO Introduction to Cybersecurity. | Module 4 Protecting the Organization Quiz Answer


Module 4 

Protecting the Organization


Question 1)

Which of the following tools can be used to provide a list of open ports on network devices?

  • Ping
  • Tracert
  • Nmap
  • Whois


Question 2)

'Today, there are single security appliances that will solve all the network security needs of an organization.'

Is this statement true or false?


  • True
  • False


Question 3)

Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

  • NetFlow
  • SIEM
  • Nmap
  • Snort


Question 4)

What tool can identify malicious traffic by comparing packet contents to known attack signatures?

  • Nmap
  • NetFlow
  • Zenmap
  • IDS


Question 5)

Behavior-based analysis involves using baseline information to detect what?

  • Risk
  • Anomalies
  • Backdoors
  • Vulnerabilities


Question 6)

What protocol is used to collect information about traffic traversing a network?

  • NAT
  • Telnet
  • NetFlow
  • HTTPS


Question 7)

'With careful planning and consideration, some risks can be completely eliminated.'

Is this statement true or false?

  • True
  • False


Question 8)

What is a security playbook?

  • A collection of security alerts, logs and historical data from the network
  • A collection of repeatable queries or reports that outline a standardized process for incident detection and response
  • A step-by-step guide on how to carry out IT-related procedures








Post a Comment

1 Comments