Practice–Cisco Security Considerations

The following activities provide practice with the topics introduced in this chapter.

Labs

Lab—Social Engineering (15.2.3)

Check Your Understanding Questions

Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. Appendix A, “Answers to the ‘Check Your Understanding‛ Questions,” lists the answers.

1. What is an example of social engineering?

  1. An unidentified person claiming to be a technician collecting user information from employees
  2. An anonymous programmer directing a DDoS attack on a data center
  3. A computer displaying unauthorized popups and adware
  4. The infection of a computer by virus carried by a Trojan

2. What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

  1. Pop-unders
  2. Adware
  3. Popups
  4. Spyware

3. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

  1. Vishing
  2. Trojan
  3. Backdoor
  4. Phishing

4. Which malicious program appears as a legitimate program to deceive the victim but is in fact an attack tool that can contain malicious code?

  1. Spyware
  2. Virus
  3. Trojan horse
  4. Worm

5. What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?

  1. Ping of death
  2. Brute force
  3. Phishing
  4. SYN flooding

6. Which type of attack attempts to overwhelm network links and devices with useless data?

  1. Denial of service
  2. Virus
  3. Brute force
  4. Spyware

7. How does a phisher typically contact a victim?

  1. Adware
  2. Email
  3. Spyware
  4. Telephone

8. Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted popup ads on a user computer?

  1. Two-factor authentication
  2. Antispyware
  3. Firewall
  4. Password manager

9. What type of attack is the ping of death?

  1. Social engineering
  2. Virus
  3. Denial of service
  4. Brute force

10. What is the primary means for mitigating virus and Trojan horse attacks?

  1. Blocking ICMP echo and echo replies
  2. Encryption
  3. Antivirus software
  4. Antisniffer software

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top