Kamis, 28 Oktober 2010

CCNA Discovery 1 Module 8 Exam Answers Version 4.0

1. • vishing
   • phishing
   • pretexting 
2. • by phone

3.
• Trojan horse

4.
• exploits vulnerabilities with the intent of propagating itself across a network


5.
• SYN flooding 
6. • popups

7.
• spam

8.
• acceptable use

9.
• Only after a virus is known can an anti-virus update be created for it. 
10 • When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.

   • Even with anti-spam software installed, users should be careful when opening e-mail attachments.
 
11. • appliance-based
12. • DMZ 
13. • Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied. 
14. • internal 
15. • to prevent outside intruders from attacking the router through the Internet

16.
• Internet access can be denied for specific days and times.


17.
• a large corporate environment 
18. • It identifies missing security updates on a computer. 
19. • Disable the wireless network when a vulnerability analysis is being performed.

20.
• a change of the default IP address

21.
• It requires that packets coming into the router be responses to internal host requests. 
     



 

Tidak ada komentar:

Posting Komentar