Common Security Threats Flashcards Preview

CCNA Security 210-260 > Common Security Threats > Flashcards

Flashcards in Common Security Threats Deck (10)
Loading flashcards...
1
Q

Which of the following is not a motivation of malicious actors?

A

Bug bounty awards

2
Q

What is considered a type of DDoS attack?

A

Directed, Reflected, Geopolitical

3
Q

Why is UDP the “protocol of choice” for reflected DDoS attacks?

A

UDP is much more easily spoofed

4
Q

What is the main leverage in social engineering?

A

Human nature

5
Q

What are some forms of social engineering?

A

Phone scams, Phishing, Malvertising

6
Q

Name some forms that are valid defenses against social engineering?

A

Two-factor authentication, Information classification, Physical security

7
Q

Which tool provides the most granular information to help in the identification of malware?

A

Packet capture

8
Q

NetFlow provides which of the following?

A

Information on the type of traffic traversing the network

9
Q

What can be used for identification of malware on the network?

A

NetFlow, IPS events, Packet captures

10
Q

Which type of data is often attractive to malicious actors?

A

Personally identifiable information (PII), Credit card data, Intellectual property (IP)