Final_Module9

Final_Module9

University

25 Qs

quiz-placeholder

Similar activities

Jaringan Komputer Pra UAS

Jaringan Komputer Pra UAS

University

25 Qs

J.611000.013.02 (MENGKONFIGURASI ROUTING DALAM SATU AS))

J.611000.013.02 (MENGKONFIGURASI ROUTING DALAM SATU AS))

University

20 Qs

Network Administration Quiz 3

Network Administration Quiz 3

University

28 Qs

Review ITE-II

Review ITE-II

University

20 Qs

Network Administration Quiz 4

Network Administration Quiz 4

University

30 Qs

QUIZZ AIJ - KONSEP ROUTING

QUIZZ AIJ - KONSEP ROUTING

KG - Professional Development

20 Qs

Postest Day 1

Postest Day 1

University

20 Qs

Review Ruting Dinamik

Review Ruting Dinamik

University

25 Qs

Final_Module9

Final_Module9

Assessment

Quiz

Computers

University

Medium

Created by

Pinal Kachhadiya

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The ________ protocol is most often used to transfer web pages.

a. HTML

b. HTTP

c. SSH

d. MIME

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which TCP port number is used for POP3?

a. 80

b. 110

c. 161

d. 443

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the default action taken on all unmatched traffic through an ACL?

a. Deny

b. Permit

c. Mark

d. Return

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When should you disable the ACLs on the interfaces?

a. At least once a day

b. Before you change a statement

c. Immediately after you delete a statement

d. Immediately after you change a statement

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

DoS is the technique of doing what?

a. Modifying addresses in packets

b. Modifying the message or binary attachment of an email message

c. Flooding a server with bogus connections

d. Changing the URL in a hyperlink

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In the security-related acronym AAA, which of these is not one of the factors?

a. Alteration

b. Authorization

c. Accounting

d. Authentication

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

If you have encrypted the secret password with the MD5 hash, how can you view the original clear-text password onscreen?

a. no enable secret

b. show secret

c. unhash secret

d. You can't do it

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers