CISCO Introduction to Cyber Security Chapter 4 Quiz 4 Solution


 


1. Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

Select one:


Snort


Nmap


SIEM


Netflow







2. Which tool can identify malicious traffic by comparing packet contents to known attack signatures?

Select one:


Zenmap


IDS


Netflow


Nmap






3. Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?

Select one:


NetFlow


Telnet


NAT


HTTPS





4. What type of attack disrupts services by overwhelming network devices with bogus traffic?

Select one:


DDoS


port scans


zero-day


brute force







5. What is the last stage of the Cyber Kill Chain framework?

Select one:


gathering target information


remote control of the target device


malicious action


creation of malicious payload


Post a Comment (0)
Previous Question Next Question

You might like