Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

ITC Final Exam Online

Last Updated on May 20, 2021 by Admin

ITC -- Final Exam

Time limit: 0

Quiz-summary

0 of 21 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21

Information

ITC — Final Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 21 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  1. Answered
  2. Review
  1. Question 1 of 21
    1. Question
    1 points

    Which statement describes cybersecurity?

    Correct

    Incorrect

    Cybersecurity is the ongoing effort to protect Internet-connected network systems and all of the data associated with the systems from unauthorized use or harm.

  2. Question 2 of 21
    2. Question
    2 points
    What are two objectives of ensuring data integrity? (Choose two.)
    Correct

    Incorrect

    The objectives for data integrity include data not being altered during transit and not being changed by unauthorized entities. Authentication and encryption are methods to ensure confidentiality. Data being available all the time is the goal of availability.

  3. Question 3 of 21
    3. Question
    1 points
    A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?
    Correct

    Incorrect

    Confidentiality ensures that data is accessed only by authorized individuals. Authentication will help verify the identity of the individuals.

  4. Question 4 of 21
    4. Question
    1 points
    A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
    Correct

    Incorrect

    Availability ensures that network services are accessible and performing well under all conditions. By load balancing the traffic destined to the main web servers, in times of a huge volume of visits the systems will be well managed and serviced.

  5. Question 5 of 21
    5. Question
    1 points

    True or False?
    An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action.

    Correct

    Incorrect

    This is a bit of a grey area and would also depend on local laws. In many cases, if the employee did something with the knowledge or approval of the company, then the legal responsibility would probably be with the company not the employee. In some areas or situations, both the company and employee could be held legally responsible.

  6. Question 6 of 21
    6. Question
    1 points
    What is the main purpose of cyberwarfare?
    Correct

    Incorrect

    Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors.

  7. Question 7 of 21
    7. Question
    1 points

    When describing malware, what is a difference between a virus and a worm?

    ITC Final Exam Answers 004
    ITC Final Exam Answers 004

    Correct

    Incorrect

    Malware can be classified as follows:

    – Virus (self replicates by attaching to another program or file)
    – Worm (replicates independently of another program)
    – Trojan Horse (masquerades as a legitimate file or program)
    – Rootkit (gains privileged access to a machine while concealing itself)
    – Spyware (collects information from a target system)
    – Adware (delivers advertisements with or without consent)
    – Bot (waits for commands from the hacker)
    – Ransomware (holds a computer system or data captive until payment is received)

  8. Question 8 of 21
    8. Question
    1 points

    What type of attack uses zombies?

    ITC Final Exam Answers 005
    ITC Final Exam Answers 005

    Correct

    Incorrect

    The hacker infects multiple machines (zombies), creating a botnet. Zombies launch the distributed denial of service (DDoS) attack.

  9. Question 9 of 21
    9. Question
    1 points
    The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
    Correct

    Incorrect

    Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware consists, typically, of annoying popup windows. Unlike a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict access to network services.

  10. Question 10 of 21
    10. Question
    1 points

    What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?

    ITC Final Exam Answers 003
    ITC Final Exam Answers 003

    Correct

    Incorrect

    The best approach to protect a data network from a possibly compromised IoT device is to place all IoT devices on an isolated network that only has access to the Internet.

  11. Question 11 of 21
    11. Question
    1 points
    What is the best method to avoid getting spyware on a machine?
    Correct

    Incorrect

    The best method to avoid getting spyware on a user machine is to download software only from trusted websites.

  12. Question 12 of 21
    12. Question
    2 points

    What are two security implementations that use biometrics? (Choose two.)

    ITC Final Exam Answers 002
    ITC Final Exam Answers 002

    Correct

    Incorrect

    Biometric authentication can be used through the use of a fingerprint, palm print, and facial or voice recognition.

  13. Question 13 of 21
    13. Question
    1 points
    Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
    Correct

    Incorrect

    Open Authorization is an open standard protocol that allows end users to access third party applications without exposing their user passwords.

  14. Question 14 of 21
    14. Question
    1 points
    A medical office employee sends emails to patients about recent patient visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
    Correct

    Incorrect

    An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.

  15. Question 15 of 21
    15. Question
    2 points
    Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
    Correct

    Incorrect

    Although each of these tools is useful for securing networks and detecting vulnerabilities, only an IDS and NetFlow logging can be used to detect anomalous behavior, command and control traffic, and infected hosts.

  16. Question 16 of 21
    16. Question
    1 points
    For what purpose would a network administrator use the Nmap tool?
    Correct

    Incorrect

    Nmap allows an administrator to perform port scanning to probe computers and the network for open ports. This helps the administrator verify that network security policies are in place.

  17. Question 17 of 21
    17. Question
    1 points
    Which stage of the kill chain used by attackers focuses on the identification and selection of targets?
    Correct

    Incorrect

    It is the first stage, reconnaissance, of the the kill chain that focuses on the identification and selection of targets.

  18. Question 18 of 21
    18. Question
    1 points
    What is an example of the a Cyber Kill Chain?
    Correct

    Incorrect

    The Cyber Kill Chain describes the phases of a progressive cyberattack operation. The phases include the following:

    • Reconnaissance
    • Weaponization
    • Delivery
    • Exploitation
    • Installation
    • Command and control
    • Actions on objectives

    In general, these phases are carried out in sequence. However, during an attack, several phases can be carried out simultaneously, especially if multiple attackers or groups are involved.

  19. Question 19 of 21
    19. Question
    1 points
    What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?
    Correct

    Incorrect

    A honeypot is a tool set up by an administrator to lure an attacker so that the behavior of the attacker can be analyzed. This information can help the administrator identify weaknesses and build a stronger defense.

  20. Question 20 of 21
    20. Question
    1 points

    What is one main function of the Cisco Security Incident Response Team?

    Correct

    Incorrect

    The time between a cyberattack and the time it takes to discover the attack is the time when hackers can get into a network and steal data. An important goal of the CSIRT is to ensure company, system, and data preservation through timely investigations into security incidents.

  21. Question 21 of 21
    21. Question
    1 points
    What action will an IDS take upon detection of malicious traffic?
    Correct

    Incorrect

    An IDS, or intrusion detection system, is a device that can scan packets and compare them to a set of rules or attack signatures. If the packets match attack signatures, then the IDS can create an alert and log the detection.

  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.