CCNA 3 Module (3-5)

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

DDoS

2
New cards

What causes a buffer overflow?

attempting to write more data to a memory location than that location can hold

3
New cards

Which objective of secure communications is achieved by encrypting data?

confidentiality

4
New cards

What type of malware has the primary objective of spreading across the network?

worm

5
New cards

What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

financial gain

6
New cards

Which type of hacker is motivated to protest against political and social issues?

hacktivist

7
New cards

What is a ping sweep?

a network scanning technique that indicates the live hosts in a range of IP addresses.

8
New cards

In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?

DoS

9
New cards

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

integrity

10
New cards

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

a private key

11
New cards
<p>Refer to the exhibit. Which two ACLs would permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface? (Choose two.)</p>

Refer to the exhibit. Which two ACLs would permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface? (Choose two.)

access-list 1 permit 192.168.10.0 0.0.0.127

access-list 5 permit 192.168.10.0 0.0.0.63

access-list 5 permit 192.168.10.64 0.0.0.63