Skip to main content

IS5403 New Week 4

 Simulation Lab 1

1.  arp -s (IP address and MAC address)

2. arp -d

3. None of these

4. Display arp cache



 Simulation Lab 2

1. Host-based Firewall







4
Question

Which of the following attack is also known as DNS spoofing?

Correct
 
4 of 8
5
Question

Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply]

Correct
 
5 of 8
6
Question

Which of the following is globally unique in the system?

Correct
 
6 of 8
7
Question

Which of the following can be triggered when a document opens?

Correct
8
Question

Which of the following command is used to detect OS on a target?

Correct
 
8 of 14
9
Question

Which of the following nmap command is used for file-exclusion?

Correct
 
9 of 14
10
Question

Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?

Correct
 
10 of 14
11
Question

Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?

Correct
 
11 of 14
12
Question

Which of the following command is used to perform xmas tree scan?

Correct
 
12 of 14
13
Question

Which of the following command is used to perform FIN scan?

Correct
2
Question

Which of the following can be used to detect malicious activities? [Choose all that apply]

Correct
 
2 of 6
3
Question

Which of the following type of security control are CCTV cameras? [Choose all that apply]

Correct
 
3 of 6
4
Question

If you are using a USB data blocker, which type of security control are you using?

Correct
 
4 of 6
5
Question

In an organization, in which of the following places would you install a fire suppression system? [Choose all that apply]

Correct
4
Question

Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity?

Correct
 
4 of 8
5
Question

Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply]

Correct
 
5 of 8
6
Question

Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply]

Correct
 
6 of 8
7
Question

Which of the following statements describe the implications of IPv6? [Choose all that apply]

Correct
3
Question

Which of the following relates to the term Data Sovereignty?

Correct
 
3 of 7
4
Question

Which of the following term relates to the accuracy and consistency of data?

Correct
 
4 of 7
5
Question

When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]

Correct
 
5 of 7
6
Question

Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]

Correct























































































































































































































































































































































































































































































Comments

Popular posts from this blog

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...