Chapter 3: Malicious Activity

Chapter 3: Malicious Activity

Professional Development

20 Qs

quiz-placeholder

Similar activities

Networking and Routing Quiz 1

Networking and Routing Quiz 1

Professional Development

23 Qs

Malware Identification Quiz

Malware Identification Quiz

Professional Development

20 Qs

Microsoft 365 Apps Updates _Pre-test

Microsoft 365 Apps Updates _Pre-test

Professional Development

23 Qs

POST TEST Perangkat Lunak Pengakses Email

POST TEST Perangkat Lunak Pengakses Email

Professional Development

25 Qs

Women-in-Tek 2025 Assessment

Women-in-Tek 2025 Assessment

Professional Development

20 Qs

Understanding HTML

Understanding HTML

Professional Development

20 Qs

SQL com Supabase

SQL com Supabase

Professional Development

15 Qs

Class Quiz

Class Quiz

Professional Development

25 Qs

Chapter 3: Malicious Activity

Chapter 3: Malicious Activity

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Adrian Velazquez

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following Linux commands will show you how much disk space is in use?

  1. top

  1. df

  1. lsof

  1. ps

Answer explanation

The df command will show you a system's current disk utilization. Both the top command and the ps command will show you information about processes, CPU, and memory utilization, whereas lsof is a multifunction tool for listing open files.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What Windows tool provides detailed information, including information about USB host controllers, memory usage, and disk transfers?

  1. Statmon

  1. Resmon

  1. Perfmon

  1. Winmon

Answer explanation

Perfmon, or Performance Monitor, provides the ability to gather detailed usage statistics for many items in Windows. Resmon, or Resource Monitor, monitors CPU, memory, and disk usage but does not provide information about things like USB host controllers and other detailed instrumentation. Statmon and winmon are not Windows built-in tools.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of network information should you capture to be able to provide a report about how much traffic systems in your network sent to remote systems?

  1. Syslog data

  1. WMI data

  1. Resmon data

  1. Flow data

Answer explanation

Flow data provides information about the source and destination IP address, protocol, and total data sent and would provide the detail needed. Syslog, WMI, and resmon data are all system log information and would not provide this information.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following technologies is best suited to prevent wired rogue devices from connecting to a network?

  1. NAC

  1. PRTG

  1. Port security

  1. NTP

Answer explanation

Network access control (NAC) can be set up to require authentication. Port security is limited to recognizing MAC addresses, making it less suited to preventing rogue devices. PRTG is a monitoring tool, and NTP is the Network Time Protocol.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As part of her job, Danielle sets an alarm to notify her team via email if her Windows server uses 80 percent of its memory and to send a text message if it reaches 90 percent utilization. What is this setting called?

  1. A monitoring threshold

  1. A preset notification level

  1. Page monitoring

  1. Perfmon calibration

Answer explanation

A monitoring threshold is set to determine when an alarm or report action is taken. Thresholds are often set to specific values or percentages of capacity.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Chris is reviewing a file that is part of an exploit package. He notes that there is a file that has content with curly brackets ({}) around statements. What file type from the following list he most likely reviewing?

  1. Plain text

  1. JSON

  1. XML

  1. HTML

Answer explanation

Chris is most likely reviewing a JSON file. HTML and XML typically use angle brackets (< and >) rather than curly brackets. Plain text does not use or require either.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What term describes a system sending heartbeat traffic to a botnet command-and-control server?

  1. Beaconing

  1. Zombie ping

  1. CNCstatus

  1. CNClog

Answer explanation

Beaconing activity (sometimes called heartbeat traffic) occurs when traffic is sent to a botnet command-and-control system. The other terms are made up.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?