CCNA Discovery 1 Chapter 8

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sparkyone
S
Sparkyone
Community Contributor
Quizzes Created: 2 | Total Attempts: 14,330
Questions: 10 | Attempts: 192

SettingsSettingsSettings
CCNA Discovery Quizzes & Trivia

Welcome to the eighth chapter on our ongoing series of quizzes regarding the Cisco CCNA Discovery program, which provides the experience and theory on networking required for a wide range of career opportunities. Have you learned all there is to learn in this chapter? Let’s find out!


Questions and Answers
  • 1. 

    What are some of the security tools and applications used in securing a network? (Choose all that apply)

    • A.

      Updates and Patches

    • B.

      Firewalls

    • C.

      DMZ

    • D.

      E-mail Checking

    • E.

      Anti-Virus

    Correct Answer(s)
    A. Updates and Patches
    B. Firewalls
    E. Anti-Virus
    Explanation
    Updates and Patches, Firewalls, and Anti-Virus are security tools and applications used in securing a network. Updates and Patches help to fix vulnerabilities and bugs in the network's software, ensuring that it is up to date and protected against potential threats. Firewalls act as a barrier between the network and external threats, monitoring and controlling incoming and outgoing network traffic. Anti-Virus software scans and detects malicious software, such as viruses and malware, and removes them from the network, preventing potential damage. These tools work together to enhance the security of a network and protect it from various cyber threats.

    Rate this question:

  • 2. 

    Ryan sent 1000's and 1000's of pings to a web server in order to slow it down. What type of attack is he implementing? 

    • A.

      Ping of Death

    • B.

      DDoS

    • C.

      DoS

    • D.

      Worm

    • E.

      Trojan Horse

    Correct Answer
    C. DoS
    Explanation
    Ryan is implementing a DoS (Denial of Service) attack by sending a large number of pings to the web server. This overwhelms the server's resources and causes it to slow down or crash, making it inaccessible to other users. This type of attack aims to disrupt the normal functioning of a system or network by flooding it with excessive traffic.

    Rate this question:

  • 3. 

    Where was Ryan when he was making his attack?

    • A.

      Inside the building

    • B.

      Outside the building

    • C.

      A or D

    • D.

      Las Vegas

    • E.

      A or B

    Correct Answer
    E. A or B
    Explanation
    The correct answer is A or B. This suggests that Ryan could have been either inside or outside the building when he was making his attack. The information provided does not specify his exact location, so both options are possible. It is unclear whether Las Vegas is relevant to the question, as it is not mentioned in the answer choices.

    Rate this question:

  • 4. 

    What is a program that gathers personal information from your computer without your permission or knowledge?

    • A.

      Cookie

    • B.

      Ad-Ware

    • C.

      Virus

    • D.

      Spyware

    • E.

      Worm

    Correct Answer
    D. Spyware
    Explanation
    Spyware is a program that secretly collects personal information from a computer without the user's consent or knowledge. It is designed to monitor a user's online activities, gather sensitive data such as passwords, credit card information, and browsing habits, and transmit this information to third parties. Spyware can be installed through malicious downloads, email attachments, or by exploiting vulnerabilities in software. It poses a significant threat to privacy and can lead to identity theft, financial loss, and other cybercrimes.

    Rate this question:

  • 5. 

    What are two types of advertising windows that can display when visting a web page? (Choose all that apply)

    • A.

      Spam

    • B.

      Spyware

    • C.

      Popup

    • D.

      Adware

    • E.

      Pop-under

    Correct Answer(s)
    C. Popup
    E. Pop-under
    Explanation
    Popup and pop-under are two types of advertising windows that can display when visiting a web page. Popup windows appear in front of the current browser window, overlaying the content, while pop-under windows open behind the current browser window and are only visible when the current window is closed or minimized. Spam, spyware, and adware are not types of advertising windows, but rather refer to unwanted or malicious software.

    Rate this question:

  • 6. 

    What are some of the signs that a virus, worm, or trojan horse maybe present in your system? (Choose all that apply)

    • A.

      Unwanted Reboot

    • B.

      CPU usage very high

    • C.

      Active NIC light when sitting idle

    • D.

      Resident Dynamic Scanning

    • E.

      Active hard drive light when sitting idle

    Correct Answer(s)
    A. Unwanted Reboot
    B. CPU usage very high
    C. Active NIC light when sitting idle
    E. Active hard drive light when sitting idle
    Explanation
    The signs that a virus, worm, or trojan horse may be present in your system include unwanted reboots, high CPU usage, active NIC light when sitting idle, and active hard drive light when sitting idle. These signs indicate that there may be malicious activity running in the background, causing the system to behave unusually. Unwanted reboots can be a result of malware trying to gain control of the system. High CPU usage can indicate the presence of a resource-intensive malicious program. The active NIC light and active hard drive light when sitting idle suggest that data is being transmitted or accessed without user intervention, indicating potential malware activity.

    Rate this question:

  • 7. 

    Darcy is trying to get information over the telephone by pretending to be someone he is not. What kind of attack is Darcy using?

    • A.

      Phising

    • B.

      Vishing

    • C.

      Pretexting

    • D.

      DDoS

    • E.

      Identity Theft

    Correct Answer
    C. Pretexting
    Explanation
    Darcy is using pretexting as an attack. Pretexting is a form of social engineering where an attacker creates a false identity or scenario to deceive someone into providing sensitive information. In this case, Darcy is pretending to be someone else over the telephone to obtain information. This tactic is commonly used to gain access to personal or financial information from unsuspecting individuals.

    Rate this question:

  • 8. 

    What are some of the features that can be included in anti-virus programs? (Choose all that apply)

    • A.

      Spam Filter

    • B.

      Resident Dynamic Scanning

    • C.

      E-mail Checking

    • D.

      Popup Blockers

    • E.

      Scheduled Scans

    Correct Answer(s)
    B. Resident Dynamic Scanning
    C. E-mail Checking
    E. Scheduled Scans
    Explanation
    Anti-virus programs are designed to protect computers from various threats. Resident Dynamic Scanning is a feature that continuously scans the system in real-time to detect and remove any viruses or malware. E-mail Checking is another important feature that scans incoming and outgoing emails for any malicious attachments or links. Scheduled Scans allow users to set up automatic scans at specific times to ensure regular system checks for viruses. Therefore, the correct answer includes these features as they are essential components of anti-virus programs.

    Rate this question:

  • 9. 

    What is the website network administrators should report new instances of malware threats?

    • A.

      Http://forms.us-cert.org/report

    • B.

      Http://forms.us-cert.gov/report

    • C.

      Https://forms.uscert.gov/report

    • D.

      Https://forms.us-cert.gov/report

    • E.

      Https://forms.us-cert.org/report

    Correct Answer
    D. Https://forms.us-cert.gov/report
    Explanation
    Network administrators should report new instances of malware threats to the website https://forms.us-cert.gov/report.

    Rate this question:

  • 10. 

    What does a DMZ do?

    • A.

      Port Forwarding

    • B.

      Allows an outside network to connect to an inside network server

    • C.

      Allows an inside network to connect to an inside network server

    • D.

      Demilitarizes Packets

    • E.

      Port Blocking

    Correct Answer
    B. Allows an outside network to connect to an inside network server
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that separates an organization's internal network from an external network, typically the internet. It acts as a buffer zone between the internal network and the outside world, allowing controlled access to specific resources. In the context of the given options, a DMZ allows an outside network to connect to an inside network server. This means that external users or networks can access specific services or servers hosted within the organization's internal network, while still maintaining a level of security and isolation.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2009
    Quiz Created by
    Sparkyone
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.