Network Engineering and Security Quiz

Network Engineering and Security Quiz

University

19 Qs

quiz-placeholder

Similar activities

Lecture 1. Technologies for Creating Web Applications

Lecture 1. Technologies for Creating Web Applications

University

15 Qs

Quiz tentang App Inventor

Quiz tentang App Inventor

11th Grade - University

21 Qs

Quiz Roblox Studio 2

Quiz Roblox Studio 2

4th Grade - University

20 Qs

COC (Code Of Challange)

COC (Code Of Challange)

11th Grade - University

15 Qs

Tippie Tech Spring Kickoff Activity

Tippie Tech Spring Kickoff Activity

University

20 Qs

2F-1 | Python Quiz | 14/10/2024

2F-1 | Python Quiz | 14/10/2024

University

20 Qs

ITP1 Week 14 Recap

ITP1 Week 14 Recap

University

15 Qs

แข่งขันcodingม.ต้น

แข่งขันcodingม.ต้น

12th Grade - University

15 Qs

Network Engineering and Security Quiz

Network Engineering and Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Arsen Dosmakhanbet

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown: #!/bin/bash

The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.

The script file has specific commands that are preceded by the pound sign (#) and should not be executed.

The commands within the script fie are to have the output stored in the /bin/bash directory.

The script file has commands that need to be run in the bash shell.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?

public

edge

private

hybrid

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)

Bandit

Viptela

VisualCodeGrepper

Brakeman

Docker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build: node { stage('Preparation') { catchError(buildResult: 'SUCCESS') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } } After saving the job, what should the engineer do next?

Test the script in Docker.

Run the job.

Open the Recent Changes option to verify the results of the job.

Manually run the samplerunning container.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three ways to mitigate SQL injection threats? (Choose three.)

database firewalls

stored procedures configured with the “db_owner” rights set as default

stateless packet-filtering firewalls

whitelist input validation

dynamic queries

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of adding salt to the password hashing process?

to decrease password complexity

to increase the length of a password

to make hashed passwords deterministic

to create a unique hash for every password

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Match the CI/CD software development philosophy with a description.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?