Back to AI Flashcard MakerCisco Certified Network Associate /CCNA 1 v7 Modules 16 – 17: Building and Securing a Small Network Exam

CCNA 1 v7 Modules 16 – 17: Building and Securing a Small Network Exam

Cisco Certified Network Associate66 CardsCreated 7 months ago

This flashcard set explores essential network security concepts including threat types, protection mechanisms like firewalls, and security functions such as authentication, authorization, and accounting. It also covers command-line security configurations and the distinctions between different types of malware and attacks.

Which component is designed to protect against unauthorized communications to and from a computer?

security center
port scanner
antimalware
antivirus
firewall

firewall

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/66

Key Terms

Term
Definition

Which component is designed to protect against unauthorized communications to and from a computer?

security center
port scanner
antimalware
antivirus
firewall

firewall

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 2 attempts 30 within 10
RouterA(config)# login block-for 30 attempts 10 within 2

RouterA(config)# login block-for 30 attempts 2 within 10

What is the purpose of the network security accounting function?

to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions

to keep track of the actions of a user

Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target

malware that was written to look like a video game

What is the difference between a virus and a worm?

Viruses self-replicate but worms do not.
Worms self-replicate but viruses do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not.

Worms self-replicate but viruses do not.

Which attack involves a compromise of data that occurs between two end points?

denial-of-service
man-in-the-middle attack
extraction of security parameters
username enumeration

man-in-the-middle attack