Skip to main content

IS5203 Week 6 Quizezz

4. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: Phishing
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: DNS poisoning
PASS
6. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: Spoofing
PASS
7. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: Evil twin
PASS
8. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: dig

PASS 

3. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer: Baseline review
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer: Upgrade the firmware on the wireless router
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer: Password policy
PASS
6. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer:
Require at least one of different kinds of characters (numbers, capital letters)
Require a minimum number of characters
PASS
7. Question
Actioned
Item completed: 02/16/2022 03:38 AM
Value: 1
Answer: To gain access to a password protected system
PASS
2. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: mbsacli /target 192.168.0.5 > reports.txt
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: 3 of 4
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: 2 of 4
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: Scans a range of IP Addresses
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:43 AM
Value: 1
Answer: The host-based firewall settings are blocking the service.
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:43 AM
Value: 1
Answer: UTM appliance
PASS
1. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer:
The default MTU is 1500 bytes
The MTU is the largest size an encapsulated segment can have
PASS
2. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: Configure VLANs on the switch
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: Checks the MAC table for the destination system
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: The first is true, the second is false
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: VLAN hopping
PASS
1. Question
Actioned
Item completed: 02/16/2022 03:50 AM
Value: 1
Answer:
Subnet mask
IPv4 address
PASS
2. Question
Actioned
Item completed: 02/16/2022 03:50 AM
Value: 1
Answer: ARP poisoning
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:51 AM
Value: 1
Answer:
Preventing the malformed DHCP traffic
Preventing the rogue DHCP servers
PASS
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
CORRECT
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
CORRECT
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
CORRECT
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
CORRECT
Which type of DoS attack orchestrates an attack using uninfected computers?
CORRECT
Which of the following is considered a secure protocol?
CORRECT
Which of these attacks is a form of Wi-Fi DoS attack?
CORRECT
A spoofed DNS record spreads to other DNS servers. What is this attack called?
CORRECT
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
CORRECT
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
CORRECT
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
CORRECT
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
CORRECT
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
CORRECT
At what layer of the OSI model do proxy servers operate?
CORRECT
What feature of Windows Server allows for agentless authentication?
CORRECT
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
CORRECT
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
CORRECT
Which of the following features is common to both an NGFW and traditional firewalls?
CORRECT
What kind of firewall blocks traffic based on application data contained within the packets?
CORRECT
What software might be installed on a device to authenticate it to the network?
CORRECT























































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh