Network Engineering and Security Quiz

Network Engineering and Security Quiz

University

19 Qs

quiz-placeholder

Similar activities

Profesi Utama di Bidang Informatika

Profesi Utama di Bidang Informatika

10th Grade - University

15 Qs

Mid Exam

Mid Exam

12th Grade - University

20 Qs

10° TIC Preguntas sobre Software de Desarrollo #2

10° TIC Preguntas sobre Software de Desarrollo #2

10th Grade - University

20 Qs

IT Quiz Bee 2025 - EASY

IT Quiz Bee 2025 - EASY

University

15 Qs

Quiz tentang Google Colab

Quiz tentang Google Colab

10th Grade - University

20 Qs

Quiz Roblox Studio 2

Quiz Roblox Studio 2

4th Grade - University

20 Qs

Kuis Uji Pemahaman Python Variabel, Sintaks Dasar, Type Data

Kuis Uji Pemahaman Python Variabel, Sintaks Dasar, Type Data

11th Grade - University

16 Qs

Desarrollo Web Integral  Examen 3 Parcial - Remedial

Desarrollo Web Integral Examen 3 Parcial - Remedial

University

15 Qs

Network Engineering and Security Quiz

Network Engineering and Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Arsen Dosmakhanbet

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is working on a bash script in order to automate some mundane tasks needed by the department. Why would the engineer add a she-bang (#!) to the top of the script as shown: #!/bin/bash

The script file has specific commands that are preceded by the exclamation mark (!) and should not be executed.

The script file has specific commands that are preceded by the pound sign (#) and should not be executed.

The commands within the script fie are to have the output stored in the /bin/bash directory.

The script file has commands that need to be run in the bash shell.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An international manufacturing company is implementing an industrial internet of things plant infrastructure. The design requires that computing resources are located as close to the user as possible. Which cloud model is suitable for this situation?

public

edge

private

hybrid

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three tools used by developers for scanning code to check for well-known security issues? (Choose three.)

Bandit

Viptela

VisualCodeGrepper

Brakeman

Docker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is configuring a Jenkins job and finishing with the following script in order to trigger the build: node { stage('Preparation') { catchError(buildResult: 'SUCCESS') { sh 'docker stop samplerunning' sh 'docker rm samplerunning' } } stage('Build') { build 'BuildAppJob' } stage('Results') { build 'TestAppJob' } } After saving the job, what should the engineer do next?

Test the script in Docker.

Run the job.

Open the Recent Changes option to verify the results of the job.

Manually run the samplerunning container.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three ways to mitigate SQL injection threats? (Choose three.)

database firewalls

stored procedures configured with the “db_owner” rights set as default

stateless packet-filtering firewalls

whitelist input validation

dynamic queries

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of adding salt to the password hashing process?

to decrease password complexity

to increase the length of a password

to make hashed passwords deterministic

to create a unique hash for every password

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Match the CI/CD software development philosophy with a description.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?