Cisco Network Security - Topic: Threats Please help me to solve the following qu
ID: 3890059 • Letter: C
Question
Cisco Network Security - Topic: Threats
Please help me to solve the following questions of correct answers, thanks
HDTN/ ame Date Network Security: Tutorial 1 - Network Threats Questions 1 Types of nctwork attacks may be classified as (a) Malicious, (b) Reconnaissance, (c) Access, (d) Denial of Service, or (e) Social Engineering. Identify the following kinds of attacks: . Ability to break into a device. Unauthorized discovery and mapping of systems Codes inserted onto a host to damage system Disable a network to deny services to intended users Manipulate individuals into performing actions. . Question 2 Malicious software may be classified as (a) Virus, (b) Trojan Horse, (c) Logic Bomb, (d) Trapdoor, (e) Worm, or (f) Bacteria. Identify the class for each of the following examples A program checks what you are doing when you are surfing the Internet. A standalone piece of codes that can replicate itself through the network A program that cxccutes on Friday thc 13th only A program that searches out other programs and infects them by embedding a copy of itself ' Question 3 ldentify which of the following is not a Reconnaissance Attacks Using fping or gping to identify the addresses that are active. Modifying thc IP portion of a ping packct hcader to indicate that there is morc data in the packct than there actually was. Using nslookup or whois to determine the IP address space assigncd to an entity. Using Nmap or Superscan to determine which network services or ports are active on the active P addresses. Question 4 Match the description on the right to the correct type of Access Attack on the left. Spoofing* Compromising a trusted host Port redirection* *Read or modify data that passes between 2 partics Password attacks | Trust exploitation ** Buffer overflow | One device attempts to pose as another by falsifying data *Write more data to a memory location than that location can hold * repeated attempt to log in to a shared resource to identify a user account, password, or both Man-in-the-middle *Using a compromised public services segment host to redirect traffic from the outside host directly to the inside hostExplanation / Answer
Question 1:
Question 2:
Question 3:
Question 4:
Question 5:
Question 6:
Answer:
(d) installing antivirus software on hosts
Answer: