ECHA Test Review 1

ECHA Test Review 1

11th - 12th Grade

47 Qs

quiz-placeholder

Similar activities

USBN TIK KELAS 9A-9C

USBN TIK KELAS 9A-9C

9th Grade - University

50 Qs

LATIHAN PAT INFORMATIKA KELAS X

LATIHAN PAT INFORMATIKA KELAS X

9th - 12th Grade

50 Qs

Sistem Keamanan Jaringan

Sistem Keamanan Jaringan

11th Grade

43 Qs

UHB INFORMATIKA XI

UHB INFORMATIKA XI

11th Grade

50 Qs

US INFORMATIKA SEMUA JURUSAN 2025

US INFORMATIKA SEMUA JURUSAN 2025

12th Grade

50 Qs

Pemrograman Dasar

Pemrograman Dasar

10th - 12th Grade

50 Qs

ôn tập 12k1

ôn tập 12k1

12th Grade

44 Qs

Data Communication and Network

Data Communication and Network

11th Grade - University

50 Qs

ECHA Test Review 1

ECHA Test Review 1

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

47 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An attacker has successfully tapped into a network segment and has configured port spanning for his connection, which allows him to see all traffic passing through the switch. Which of the fo1lowing protocols protects any sensitive data from being seen by this attacker?

SFTP

IMAP

SMTP

SSH

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following techniques can be used to gather information from a fully switched network or to disable some of the traffic isolation features of a switch? (Choose two.)

DHCP starvation

MAC flooding

Promiscuous mode

ARP spoofing

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Examine the following Snort rule:

alert tcp !$HOME_NET any-> $HOME_NET 23 (content:

"admin"; msg: "Telnet at tempt .. admin access";)

Which of the following are true regarding the rule? ( Choose all that apply.)

This rule will alert on packets coming from the designated home network.

This rule will alert on packets coming from outside the designated home address

This rule will alert on packets designated for any port, from port 23, containing the "admin" string.

This rule will alert on packets designated on port 23, from any port, containing the "admin" string.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are performing an ACK scan against a target subnet. You previously verified connectivity to several hosts within the subnet but want to verify all live hosts on the subnet. Your scan, however, is not receiving any replies. Which type of firewall is most likely in use at your location?

Packet filtering

IPS

Stateful

Active

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Examine the Wireshark filter shown here:

ip.src == 192.168.1.1 && tcp.srcport == 80

Which of the following correctly describes the capture filter?

The results will display all traffic from 192.168.1.1 destined for port 80.

The results will display all HTTP traffic to 192.168.1.1.

The results will display all HITP traffic from 192.168.1.1.

No results will display because of invalid syntax.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following correctly describes brute-force password attacks?

Feeding a list of words into a cracking program

Comparing the hash values to lists of prehashed values for a match

Attempting all possible combinations of letters, numbers, and special characters in succession

Threatening the user with physical violence unless they reveal their password

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

You are attempting to hack a Windows machine and want to gain a copy of the SAM file. Where can you find it? (Choose all that apply.)

c:\winnt\config

/etc/shadow

c:\windows\repair

c:\ windows\system32\config

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?