1. During a pretexting event, how is a target typically contacted?
* by phone

2. Identify three techniques used in social engineering. (Choose three.)
* vishing
* phishing

* pretexting

3. What is a major characteristic of a Worm?
* exploits vulnerabilities with cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 intent of propagating itself across a network

4. A flood of packets with invalid source-IP addresses requests a connection on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
* SYN flooding

5. While surfing cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet, a user notices a box claiming a prize has been won. The user opens cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 box unaware that a program is being installed. An intruder now accesses cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 computer and retrieves personal information. What type of attack occurred?
* Trojan horse

6. What is a widely distributed approach to marketing on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet that advertises to as many individual users as possible via IM or e-mail?
* spam

7. What type of advertising is typically annoying and associated with a specific website that is being visited?
* popups

8. Which statement is true regarding anti-virus software?
* Only after a virus is known can an anti-virus update be created for it.

9. What part of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 security policy states what applications and usages are permitted or denied?
* acceptable use

10. What term is used to describe a dedicated hardware device that provides firewall services?
* appliance-based

11. Which two statements are true concerning anti-spam software? (Choose two.)
* When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
* Even with anti-spam software installed, users should be careful when opening e-mail attachments.

12. Which statement is true about port forwarding within a Linksys integrated router?
* Only external traffic that is destined for specific internal ports is permitted. All ocá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365r traffic is denied.

13. Which acronym refers to an area of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
* DMZ

14. Refer to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 graphic. What is cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 purpose of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet Filter option of Filter IDENT (Port 113. on cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Linksys integrated router?
* to prevent outside intruders from attacking cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 router through cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Internet

15. What statement is true about security configuration on a Linksys integrated router?
* Internet access can be denied for specific days and times.

16. To which part of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 network does cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 wireless access point part of a Linksys integrated router connect?
* internal

17. What environment would be best suited for a two-firewall network design?
* a large corporate environment

18. Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 recommendation that is not a best practice for wired and wireless security.
* Disable cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 wireless network when a vulnerability analysis is being performed.

19. What best practice relates to wireless access point security?
* a change of cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 default IP address

20. What is one function that is provided by a vulnerability analysis tool?
* It identifies missing security updates on a computer.

21. Refer to cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 graphic. In cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 Linksys Security menu, what does cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 SPI Firewall Protection option Enabled provide?
* It requires that packets coming into cá cược thể thao bet365_cách nạp tiền vào bet365_ đăng ký bet365 router be responses to internal host requests.

CCNA-D1-Module-8(100%)-Exam-Answers-V4.0(Quick Answers)