Search Header Logo

Linux, Cisco and Cyber

Authored by Steve Cranage

Other

Professional Development

Used 4+ times

Linux, Cisco and Cyber
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following is one of the key principles of the CIA triad of information security

Accessibility

Authentication

Availability

Assymetric

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The HTTP protocol belongs to which layer of the OSI model

Presentation

Session

Network

Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command would you use to run with root level privileges in Linux

pseudo

la -al

sudo

pwd

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol does not belong to the application layer of the TCP/IP model

FTP

HTTPS

TLS

TCP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command would be used to encrypt all plain text passwords on a Cisco device

crypto key generate rsa

do show arp

service password-encryption

copy run star

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool best fits the description of a network protocol analyser

dsniff

ping

traceroute

wireshark

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these is your favourite scary movie

finding nemo

mulan

barbie

scream

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?