FIRST GRADING
MIDTERM
FINALS
100
Attacks usually came from the internal network. (True or False)
True
100
What are the two types of ACL?
Standard and Extended
100
Give 1 host-based anti-malware protection.

Antivirus/Antimalware

SPAM Filtering

URL Filtering

Blacklisting

Data Loss Prevention (DLP)


200
Enumerate the three edge router security approach.
single router, defense-in-depth,DMZ
200
A AAA communication protocol that is extensive in accounting.
Radius
200
What OSI layer is usually compromise?
Layer2/Data Link
300

Type of modern skill teenagers and inexperienced hackers running scripts, tools, and exploits to cause harm but typically not for profit.


Script Kiddies
300
A system sensor that mirrors the packet as its moves to its final destination device.
IDS
300
Enumerate the three violation mode in port-security.
shutdown, restrict, protect
400

A malicious code that is attached to executable files which are often legitimate programs.


VIRUS
400
A type of firewall that uses zone to divide the different part of the network.
ZPF
400
DHCP snooping must be enable before implementing DAI. (True or False)
True
500

A network administrator needs to protect a router against brute force login attempts. What is the correct login-block-for command syntax to disable login for 3 minutes if more than 3 failed attempts are made within a 2 minute period?


A. login block-for 180 attempts 120 within 3

B. login block-for 3 attempts 120 within 3

C. login block-for 3 attempts 3 within 2

D. login block-for 180 attempts 3 within 120

D
500

Which command helps verify the Cisco IOS IPS configuration?


A. Router# show ip ips configuration

B. Router# show ip ips statistics

C.Router# show ip ips sessions

D.Router# show ip ips signatures

A
500

Enabling traffic from one VLAN to be seen by another VLAN is the goal of a VLAN ______________ attack.

hopping
M
e
n
u