Introduction to Cybersecurity (CISCO)

IT6205A-2113T Introduction to Cybersecurity Introduction
(Chapter 4 Quiz)


Question text

Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information about the traffic that is traversing the network?
Select one:
HTTPS
NAT
Telnet
NetFlow

Feedback

Question text

Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
Select one:
Netflow
SIEM
Snort
Nmap

Feedback

Question text

What type of attack disrupts services by overwhelming network devices with bogus traffic?
Select one:
brute force
DDoS
zero-day
port scans

Feedback

Question text

What is the last stage of the Cyber Kill Chain framework?
Select one:
malicious action
creation of malicious payload
gathering target information
remote control of the target device

Feedback

Question text

Which tool can identify malicious traffic by comparing packet contents to known attack signatures?
Select one:
Netflow
IDS
Zenmap
Nmap

Feedback