Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Cybersecurity Essentials 1.1 Chapter 3 Quiz Online

Last Updated on May 20, 2021 by Admin

Cybersecurity Essentials 1.1 Chapter 3 Quiz Online

CE -- Chapter 3 Quiz

Time limit: 0

Quiz-summary

0 of 18 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

Information

CE — Chapter 3 Quiz

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 18 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  1. Answered
  2. Review
  1. Question 1 of 18
    1. Question
    1 points
    What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
    Correct

    Incorrect

    Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications.

    Hint

    Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications.

  2. Question 2 of 18
    2. Question
    1 points
    What type of attack targets an SQL database using the input field of a user?
    Correct

    Incorrect

    A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly.

    Hint

    A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly.

  3. Question 3 of 18
    3. Question
    2 points
    Which two reasons describe why WEP is a weak protocol? (Choose two.)
    Correct

    Incorrect

    The initialization vector (IV) of WEP is as follows:

    • Is a 24-bit field, which is too small
    • Is cleartext and readable
    • Is static and causes identical key streams to repeat on a busy network
    Hint

    The initialization vector (IV) of WEP is as follows:

    • Is a 24-bit field, which is too small
    • Is cleartext and readable
    • Is static and causes identical key streams to repeat on a busy network
  4. Question 4 of 18
    4. Question
    1 points
    What is the difference between a virus and a worm?
    Correct

    Incorrect

    Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation.

    Hint

    Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation.

  5. Question 5 of 18
    5. Question
    1 points
    A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?
    Correct

    Incorrect

    Spyware is software that tracks the activity of a user and obtains information about that user.

    Hint

    Spyware is software that tracks the activity of a user and obtains information about that user.

  6. Question 6 of 18
    6. Question
    1 points
    What is the meaning of the term logic bomb?
    Correct

    Incorrect

    A logic bomb remains inactive until a trigger event occurs. Once activated, a logic bomb runs malicious code that causes harm to a computer.

    Hint

    A logic bomb remains inactive until a trigger event occurs. Once activated, a logic bomb runs malicious code that causes harm to a computer.

  7. Question 7 of 18
    7. Question
    1 points
    What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
    Correct

    Incorrect

    Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.

    Hint

    Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.

  8. Question 8 of 18
    8. Question
    2 points
    What are two ways to protect a computer from malware? (Choose two.)
    Correct

    Incorrect

    At a minimum, a computer should use antivirus software and have all software up to date to defend against malware.

    Hint

    At a minimum, a computer should use antivirus software and have all software up to date to defend against malware.

  9. Question 9 of 18
    9. Question
    1 points
    What occurs on a computer when data goes beyond the limits of a buffer?
    Correct

    Incorrect

    A buffer overflow occurs by changing data beyond the boundaries of a buffer and can lead to a system crash, data compromise, or cause escalation of privileges.

    Hint

    A buffer overflow occurs by changing data beyond the boundaries of a buffer and can lead to a system crash, data compromise, or cause escalation of privileges.

  10. Question 10 of 18
    10. Question
    1 points
    What is the term used to describe an email that is targeting a specific person employed at a financial institution?
    Correct

    Incorrect

    Spear phishing is a phishing attack customized to reach a specific person or target.

    Hint

    Spear phishing is a phishing attack customized to reach a specific person or target.

  11. Question 11 of 18
    11. Question
    1 points
    An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?
    Correct

    Incorrect

    Blusnarfing is the copying of user information through unauthorized Bluetooth transmissions.

    Hint

    Blusnarfing is the copying of user information through unauthorized Bluetooth transmissions.

  12. Question 12 of 18
    12. Question
    2 points
    What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)
    Correct

    Incorrect

    Social engineering tactics include the following:

    • Authority
    • Intimidation
    • Consensus/Social Proof
    • Scarcity
    • Urgency
    • Familiarity/Liking
    • Trust
    Hint

    Social engineering tactics include the following:

    • Authority
    • Intimidation
    • Consensus/Social Proof
    • Scarcity
    • Urgency
    • Familiarity/Liking
    • Trust
  13. Question 13 of 18
    13. Question
    2 points
    What are two common indicators of spam mail? (Choose two.)
    Correct

    Incorrect

    Spam is a common method of advertising through the use of unsolicited email and may contain malware.

    Hint

    Spam is a common method of advertising through the use of unsolicited email and may contain malware.

  14. Question 14 of 18
    14. Question
    1 points
    Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
    Correct

    Incorrect

    Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website.

    Hint

    Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website.

  15. Question 15 of 18
    15. Question
    1 points
    A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
    Correct

    Incorrect

    Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.

    Hint

    Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.

  16. Question 16 of 18
    16. Question
    1 points
    What is the name for the type of software that generates revenue by generating annoying pop-ups?
    Correct

    Incorrect

    Adware is a type of malware that displays pop-ups on a computer to generate revenue for the creator of the malware.

    Hint

    Adware is a type of malware that displays pop-ups on a computer to generate revenue for the creator of the malware.

  17. Question 17 of 18
    17. Question
    1 points
    What does a rootkit modify?
    Correct

    Incorrect

    A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.

    Hint

    A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.

  18. Question 18 of 18
    18. Question
    1 points
    What is the name given to a program or program code that bypasses normal authentication?
    Correct

    Incorrect

    A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.

    Hint

    A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.

  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.