1. (TCO A) _____ is malware that executes unexpected or unauthorized actions. (P
ID: 3842177 • Letter: 1
Question
1. (TCO A) _____ is malware that executes unexpected or unauthorized actions. (Points : 5) PhishingA smurf attack
A Trojan horse
A botnet attack Question 2. (TCO A) RFC 2827 ACL is not enough to mitigate _____ attacks. (Points : 5) smurf
land.c
IP spoof
man-in-the-middle Question 3. (TCO B) Which is the least appropriate choice for an individual PC firewall? (Points : 5) Host-based firewall
Software firewall
Client firewall
Perimeter firewall Question 4. (TCO B) This firewall action is typically used to permit inbound or outbound access to a resource only when the dynamic ACLs are activated (unlocked) by a telnet connection (the key). Once activated, the ACL remains active until a timeout value expires. (Points : 5) Established ACLs
Reflexive ACLs
Lock and key
Context-based access control Question 5. (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If the response is ERROR, this means _____. (Points : 5) the user has not entered the correct TACACS+ username and password
the TACACS+ server has not responded to the authentication query
the NAS authentication cache is full
the NAS is shut down Question 6. (TCO C) Which protocols would be most suited for AAA on all Cisco equipment networks? (Points : 5) TACACS+ and TCP
TACACS+ and UDP
RADIUS and UDP
RADIUS and TCP 1. (TCO A) _____ is malware that executes unexpected or unauthorized actions. (Points : 5) Phishing
A smurf attack
A Trojan horse
A botnet attack
Explanation / Answer
1. A Trojan horse
2.IP Spoofing
3.Perimeter Firewall
4. Eshtablished ACLs
5. the TACACS+ server has not responded to the authentication query
6.RADIUS and UDP
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.