
Network Engineering and Security Quiz
Authored by Arsen Dosmakhanbet
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown: #!/bin/bash
The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.
The script file has specific commands that are preceded by the pound sign (#) and should not be executed.
The commands within the script fie are to have the output stored in the /bin/bash directory.
The script file has commands that need to be run in the bash shell.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?
public
edge
private
hybrid
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)
Bandit
Viptela
VisualCodeGrepper
Brakeman
Docker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build: node { stage('Preparation') { catchError(buildResult: 'SUCCESS') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } } After saving the job, what should the engineer do next?
Test the script in Docker.
Run the job.
Open the Recent Changes option to verify the results of the job.
Manually run the samplerunning container.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are three ways to mitigate SQL injection threats? (Choose three.)
database firewalls
stored procedures configured with the “db_owner” rights set as default
stateless packet-filtering firewalls
whitelist input validation
dynamic queries
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of adding salt to the password hashing process?
to decrease password complexity
to increase the length of a password
to make hashed passwords deterministic
to create a unique hash for every password
7.
OPEN ENDED QUESTION
3 mins • 1 pt
Match the CI/CD software development philosophy with a description.
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?