Skip to main content

IS5403 New Week 4

 Simulation Lab 1

1.  arp -s (IP address and MAC address)

2. arp -d

3. None of these

4. Display arp cache



 Simulation Lab 2

1. Host-based Firewall







4
Question

Which of the following attack is also known as DNS spoofing?

Correct
 
4 of 8
5
Question

Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply]

Correct
 
5 of 8
6
Question

Which of the following is globally unique in the system?

Correct
 
6 of 8
7
Question

Which of the following can be triggered when a document opens?

Correct
8
Question

Which of the following command is used to detect OS on a target?

Correct
 
8 of 14
9
Question

Which of the following nmap command is used for file-exclusion?

Correct
 
9 of 14
10
Question

Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?

Correct
 
10 of 14
11
Question

Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?

Correct
 
11 of 14
12
Question

Which of the following command is used to perform xmas tree scan?

Correct
 
12 of 14
13
Question

Which of the following command is used to perform FIN scan?

Correct
2
Question

Which of the following can be used to detect malicious activities? [Choose all that apply]

Correct
 
2 of 6
3
Question

Which of the following type of security control are CCTV cameras? [Choose all that apply]

Correct
 
3 of 6
4
Question

If you are using a USB data blocker, which type of security control are you using?

Correct
 
4 of 6
5
Question

In an organization, in which of the following places would you install a fire suppression system? [Choose all that apply]

Correct
4
Question

Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity?

Correct
 
4 of 8
5
Question

Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply]

Correct
 
5 of 8
6
Question

Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply]

Correct
 
6 of 8
7
Question

Which of the following statements describe the implications of IPv6? [Choose all that apply]

Correct
3
Question

Which of the following relates to the term Data Sovereignty?

Correct
 
3 of 7
4
Question

Which of the following term relates to the accuracy and consistency of data?

Correct
 
4 of 7
5
Question

When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]

Correct
 
5 of 7
6
Question

Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]

Correct























































































































































































































































































































































































































































































Comments

Popular posts from this blog

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...

IS5503 Cloud Computing Solutions

  Week-1 Pre Assessment 1) You are working as a cloud architect at Congruence crop. Management he asked you to implement an vitualized infrastructure to provide the company’s  employees with on-demand storage which should be accessible through a web interface over the public internet. Which of the following cloud deployment models will you use to implement this ? Private 2) Which of the following storage solutions saves space by eliminating files or blocks that have redundant data? Deduplication 3) You are as a cloud administrator at BigCo. Management he asked you to move the company’s on-premises data to the cloud. You have received a request from the network administration team while migrating. They want to manage both the Linux- and Windows-based servers efficiently. What should you implement to accomplish this task? Secure Shell Remote Desktop Protocol 4) Ron, a security analyst, found an unkwon design flaw in a product. He notices that correc...