Skip to main content

IS5203 Week 6 All Quizzes

Unit 9 Quiz

Which of the following is considered a secure protocol?
CORRECT

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
CORRECT

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
CORRECT

Which type of DoS attack orchestrates an attack using uninfected computers?
CORRECT

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
CORRECT

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
CORRECT

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
CORRECT

A spoofed DNS record spreads to other DNS servers. What is this attack called?
CORRECT

What kind of attack simulation detects vulnerabilities and attempts to exploit them?
CORRECT

Which of these attacks is a form of Wi-Fi DoS attack?
CORRECT

                                                                   Unit 10 Quiz                                                             

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
CORRECT

What kind of firewall blocks traffic based on application data contained within the packets?
CORRECT

Which of the following features is common to both an NGFW and traditional firewalls?
CORRECT

What feature of Windows Server allows for agentless authentication?
CORRECT

What software might be installed on a device to authenticate it to the network?
CORRECT

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
CORRECT

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
CORRECT

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
CORRECT

Active Directory and 389 Directory Server are both compatible with which directory access protocol?
CORRECT

At what layer of the OSI model do proxy servers operate?
CORRECT

                                                                                                              
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?


    
    Which type of DoS attack orchestrates an attack bounced off uninfected computers?
Correct
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Correct
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Correct

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Correct

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Correct

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.
Correct

Which of the following is considered a secure protocol?
Correct

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
Correct

What type of attack relies on spoofing?
  [Deauth Attack is correct answer ]
Incorrect

4
Question

What does the acronym CIA stand for in relation to network security? [Choose all that apply]

Correct
 
4 of 9
5
Question

Which threat actor will have prior knowledge of the network layout to perform a malicious attack?

Correct
 
5 of 9
6
Question

What is the purpose of Role-based Access Control (RABC)?

Correct
 
6 of 9
7
Question

Where in a network segment will the DMZ be located?

Correct
 
7 of 9
8
Question

Which of the following can be used for multi-factor authentication? [Choose all that apply]

Correct

3
Question

You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?

Correct
 
3 of 8
4
Question

You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?

Correct
 
4 of 8
5
Question

You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?

Correct
 
5 of 8
6
Question

A password policy as part of a network user agreement may require users to do which of the following? [Choose all that apply].

Correct
 
6 of 8
7
Question

Why would an attacker perform a brute force attack?

Correct

2
Question

Which of the following commands do you need to run in order to scan the PLABWIN10 devices?

Correct
 
2 of 6
3
Question

From the MBSA scan performed in Task 3, how many users have non-expiring passwords?

Correct
 
3 of 6
4
Question

After performing the MBSA scan from the Command Line in task 4, how many user accounts have blank or simple passwords?

Correct
 
4 of 6
5
Question

When executing the mbsacli command, what does the /r function perform?

Correct
4
Question

Your organization’s network has multiple layers of security devices. When you attempt to connect to a service on the Internet. However, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?

Correct
 
4 of 6
5
Question

Refer to the exhibit. Which of the following networking device is being shown in the middle in red color?

reference image for question

Correct
1
Question

Which of the following are characteristics of the MTU when applied to IP and Ethernet networks? [Choose all that apply.]

Correct
 
1 of 6
2
Question

Your network comprises of multiple switches and a single router. Currently, all users of finance and marketing on the third floor are connected to a flat switch. You must segregate traffic between your finance and marketing groups. You need to ensure that critical finance information can flow without delay to the finance users and ensure additional level of security. What should you do?

Correct
 
2 of 6
3
Question

When a switch receives data on one of its ports, what is the next step does it perform?

Correct
 
3 of 6
4
Question

Identify the correct statement for a switch’s MAC Address Table.
It is possible to have more than one MAC address corresponding to a single port.
It is possible to have more than one port corresponding to a single MAC address.

Correct
 
4 of 6
5
Question

While examining frames on the network using a packet analyzer, you observe several frames that are double tagged. What kind of attack could a host on the network be performing that may result in this?

Correct
1
Question

Which of the following IP network configuration elements a DHCP server, running on Windows Server 2012, can provide to a Windows 10 system? [Choose all that apply.]

Correct
 
1 of 4
2
Question

Refer to the exhibit. Which of the following type of attack is being depicted?

Topology image.

Correct
 
2 of 4
3
Question

Which of the following can be prevented if DHCP snooping is implemented on a switch? [Choose all that apply].

Correct
Which OSI layer is responsible for directing data from one LAN to another?
Correct

What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Correct

When a router can't determine a path to a message's destination, where does it send the message?
Correct

A routing protocol's reliability and priority are rated by what measurement?
Correct

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?
Correct

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Correct

What kind of device can monitor a connection at the demarc but cannot interpret data?
Correct

What specifications define the standards for cable broadband?
Correct


What method does a GSM network use to separate data on a channel?
Correct

Which of these cellular technologies offers the fastest speeds?
Correct











































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh