Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

Choose the right answer 1-What is the motivation of a white hat attacker? Taking advantage of any vulnerability for illegal personal gain fine-tuning network devices

Choose the right answer

1-What is the motivation of a white hat attacker?

Taking advantage of any vulnerability for illegal personal gain

fine-tuning network devices to improve their performance and efficiency

studying operating systems of various platforms to develop a new system

discovering weaknesses of networks and systems to improve the security level of these systems

2-Which security threat is self-replicate and propagates across networks from a singular host, consuming a lot of bandwidth?

adware

viruses

worms

spyware

3-It is a series of zombie computers working together towage a network attack.

• worm

• virus

• Trojan horse

• botnet

4- What is a characteristic of a DoS attack as it relates to network security?

• Malware is contained in a seemingly legitimate executable program.

• Extreme quantities of data are sent to a particular network device interface.

• An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.

• Too much information is destined for a particular memory block, causing additional memory areas to be affected.

5- Why would a rootkit be used by a hacker?

• to do reconnaissance

• to try to guess a password

• to gain access to a device without being detected

• to reverse engineer binary files

6- Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?

• buffer overflow attack

• port redirection attack

• denial of service attack

• brute-force attack

• IP spoofing attack

• packet sniffer attack

7- It is a type of phishing that uses voice and the phone system that is used in social engineering attacks?

• buffer overflow

• vishing

• phishing

• man-in-the-middle

• pretexting

sending junk email

8- Which authentication method stores usernames and passwords in the router and is ideal for small networks?

• local AAA

• local AAA over RADIUS

• local AAA over TACACS+

• server-based AAA

• server-based AAA over RADIUS

• server-based AAA over TACACS+

9- Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

• accessibility

• accounting

• authentication

• authorization

10- A user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?

• Use the none keyword when configuring the authentication method list.

• Use the aaa local authentication attempts max-fail global configuration mode command with a higher number of acceptable failures.

• Use the login delay command for authentication attempts.

• Use the login local command for authenticating user access.

11- What difference exists when using Windows Server as an AAA server, rather than Cisco Secure ACS?

• Windows Server requires more Cisco IOS commands to configure.

• Windows Server only supports AAA using TACACS.

• Windows Server uses its own Active Directory (AD)controller for authentication and authorization.

• Windows Server cannot be used as an AAAserver.

12-Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis?

• ACS

• SSH

• RADIUS

• TACACS+

Step by Step Solution

3.41 Rating (167 Votes )

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below Answer 1 Discovering Weaknesses of Networks and Systems to Improve the Security Level of These Systems White hat attackers also known as et... blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Organizational Behavior

Authors: Don Hellriegel, john W Slocum

13th Edition

143904225X, 978-1439042250

More Books

Students explore these related Electrical Engineering questions