Skip to main content

IS5403 New Week 4

 Simulation Lab 1

1.  arp -s (IP address and MAC address)

2. arp -d

3. None of these

4. Display arp cache



 Simulation Lab 2

1. Host-based Firewall







4
Question

Which of the following attack is also known as DNS spoofing?

Correct
 
4 of 8
5
Question

Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply]

Correct
 
5 of 8
6
Question

Which of the following is globally unique in the system?

Correct
 
6 of 8
7
Question

Which of the following can be triggered when a document opens?

Correct
8
Question

Which of the following command is used to detect OS on a target?

Correct
 
8 of 14
9
Question

Which of the following nmap command is used for file-exclusion?

Correct
 
9 of 14
10
Question

Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?

Correct
 
10 of 14
11
Question

Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?

Correct
 
11 of 14
12
Question

Which of the following command is used to perform xmas tree scan?

Correct
 
12 of 14
13
Question

Which of the following command is used to perform FIN scan?

Correct
2
Question

Which of the following can be used to detect malicious activities? [Choose all that apply]

Correct
 
2 of 6
3
Question

Which of the following type of security control are CCTV cameras? [Choose all that apply]

Correct
 
3 of 6
4
Question

If you are using a USB data blocker, which type of security control are you using?

Correct
 
4 of 6
5
Question

In an organization, in which of the following places would you install a fire suppression system? [Choose all that apply]

Correct
4
Question

Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity?

Correct
 
4 of 8
5
Question

Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply]

Correct
 
5 of 8
6
Question

Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply]

Correct
 
6 of 8
7
Question

Which of the following statements describe the implications of IPv6? [Choose all that apply]

Correct
3
Question

Which of the following relates to the term Data Sovereignty?

Correct
 
3 of 7
4
Question

Which of the following term relates to the accuracy and consistency of data?

Correct
 
4 of 7
5
Question

When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]

Correct
 
5 of 7
6
Question

Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]

Correct























































































































































































































































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh