Introduction to Cybersecurity 2.1 Chapter Quiz Answers


Introduction to Cybersecurity: Chapter 4 Quiz (Answers)


                   

1. Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
a) Nmap
b) SIEM
c) Snort
d) Netflow

Solution: c) Snort

2. Which tool can identify malicious traffic by comparing packet contents to known attack signatures?
a) Nmap
b) Zenmap
c) Netflow
d) IDS

Solution: d) IDS

3. What type of attack disrupts services by overwhelming network devices with bogus traffic?
a) brute force
b) zero-day
c) port scans
d) DDoS

Solution: d) DDoS

4. What is the last stage of the Cyber Kill Chain framework?
a) gathering target information
b) remote control of the target device
c) malicious action
d) creation of malicious payload

Solution: c) malicious action

5. Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?
a) NAT
b) NetFlow
c) Telnet
d) HTTPS

Solution: b) NetFlow