Search Header Logo

DEVNET#1

Authored by Equitable Kazakh

Arts

1st Grade

50 Questions

Used 5+ times

DEVNET#1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. A pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?

  • community cloud

  • public cloud

  • hybrid cloud

  • private cloud

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What is a function provided by an implementation of a read-only automation solution?

  • the ability to reduce risk by implementing security policies across the network infrastructure via automated changes

  • the ability to use GET and SET requests to retrieve and send data across the network infrastructure

  • the ability to use an automated request to audit configurations and manually deploy changes in order to implement compliance

  • the ability to implement network infrastructure that receives a configuration from a specific centralized server

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

3. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

  • The TCP process running on the PC randomly selects the destination port when establishing a session with the server

  • UDP segments are encapsulated within IP packets for transport across the network

  • The TCP source port number identifies the sending host on the network

  • The UDP destination port number identifies the application or service on the server which will handle the data.

  • The source port field identifies the running application or service that will handle data returning to the PC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What type of attack targets an SQL database using the input field of a user?

  • buffer overflow

  • SQL injection

  • Cross site scripting

  • XML injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which command can be used on Linux and MAC hosts to get IP addressing information?

  • ipconfig

  • ip address

  • ifconfig

  • networksetup -getinfo

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

6. What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)

  • to create fewer collision domains

  • to enhance user bandwidth

  • to isolale ARP request messages from the rest of the network

  • to eliminate virtual circuits

  • to isolate traffic between segments

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which tool might a developer use as part of a Continuous Integration pipeline in order to build and test source code?

SQL

REST

Docker

Jenkins

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Arts