Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Cybersecurity Essentials 1.1 Chapter 3 Quiz Answers

Last Updated on May 20, 2021 by Admin

Cybersecurity Essentials 1.1 Chapter 3 Quiz Answers 100% 2018

  1. What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

    • buffer overflow
    • SQL injection
    • XML injection
    • Cross-site scripting
      Explanation:

      Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications.
  2. What type of attack targets an SQL database using the input field of a user?

    • buffer overflow
    • SQL injection
    • XML injection
    • Cross-site scripting
      Explanation:

      A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly.
  3. Which two reasons describe why WEP is a weak protocol? (Choose two.)

    • WEP uses the same encryption features as Bluetooth.
    • Everyone on the network uses a different key.
    • The key is static and repeats on a congested network.
    • The default settings cannot be modified.
    • The key is transmitted in clear text.
      Explanation:

      The initialization vector (IV) of WEP is as follows:

      • Is a 24-bit field, which is too small
      • Is cleartext and readable
      • Is static and causes identical key streams to repeat on a busy network
  4. What is the difference between a virus and a worm?

    • Viruses hide in legitimate programs but worms do not.
    • Worms self-replicate but viruses do not.
    • Viruses self-replicate but worms do not.
    • Worms require a host file but viruses do not.
      Explanation:

      Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation.
  5. A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

    • phishing
    • adware
    • spyware
    • virus
      Explanation:

      Spyware is software that tracks the activity of a user and obtains information about that user.
  6. What is the meaning of the term logic bomb?

    • a malicious worm
    • a malicious program that uses a trigger to awaken the malicious code
    • a malicious virus
    • a malicious program that hides itself in a legitimate program
      Explanation:

      A logic bomb remains inactive until a trigger event occurs. Once activated, a logic bomb runs malicious code that causes harm to a computer.
  7. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

    • Trojan
    • vishing
    • phishing
    • backdoor
    • social engineering
      Explanation:

      Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.
  8. What are two ways to protect a computer from malware? (Choose two.)

    • Empty the browser cache.
    • Use antivirus software.
    • Delete unused software.
    • Keep software up to date.
    • Defragment the hard disk.
      Explanation:

      At a minimum, a computer should use antivirus software and have all software up to date to defend against malware.
  9. What occurs on a computer when data goes beyond the limits of a buffer?

    • a buffer overflow
    • a system exception
    • an SQL injection
    • cross-site scripting
      Explanation:

      A buffer overflow occurs by changing data beyond the boundaries of a buffer and can lead to a system crash, data compromise, or cause escalation of privileges.
  10. What is the term used to describe an email that is targeting a specific person employed at a financial institution?

    • spam
    • vishing
    • spear phishing
    • target phishing
    • spyware
      Explanation:

      Spear phishing is a phishing attack customized to reach a specific person or target.
  11. An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

    • RF jamming
    • smishing
    • bluejacking
    • bluesnarfing
      Explanation:

      Blusnarfing is the copying of user information through unauthorized Bluetooth transmissions.
  12. What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

    • intimidation
    • compassion
    • honesty
    • urgency
    • integrity
      Explanation:

      Social engineering tactics include the following:

      • Authority
      • Intimidation
      • Consensus/Social Proof
      • Scarcity
      • Urgency
      • Familiarity/Liking
      • Trust
  13. What are two common indicators of spam mail? (Choose two.)

    • The email has keywords in it.
    • The email has misspelled words or punctuation errors or both.
    • The email is from your supervisor.
    • The email is from a friend.
    • The email has no subject line.
    • The email has an attachment that is a receipt for a recent purchase.
      Explanation:

      Spam is a common method of advertising through the use of unsolicited email and may contain malware.
  14. Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

    • spam
    • smishing
    • grayware
    • impersonation
      Explanation:

      Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website.
  15. A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

    • a type of logic bomb
    • a type of virus
    • a type of worm
    • a type of ransomware
      Explanation:

      Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.
  16. What is the name for the type of software that generates revenue by generating annoying pop-ups?

    • spyware
    • trackers
    • pop-ups
    • adware
      Explanation:

      Adware is a type of malware that displays pop-ups on a computer to generate revenue for the creator of the malware.
  17. What does a rootkit modify?

    • Microsoft Word
    • Notepad
    • screen savers
    • programs
    • operating system
      Explanation:

      A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.
  18. What is the name given to a program or program code that bypasses normal authentication?

    • virus
    • worm
    • ransomware
    • Trojan
    • backdoor
      Explanation:

      A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.
  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.