99-199

99-199

Professional Development

101 Qs

quiz-placeholder

Similar activities

Conocimientos sobre Redes de Datos

Conocimientos sobre Redes de Datos

Professional Development

100 Qs

KNX (Parte 1)

KNX (Parte 1)

Professional Development

98 Qs

Quiz sobre Programação

Quiz sobre Programação

Professional Development

100 Qs

CHƯƠNG 1: GIỚI THIỆU HỆ ĐIỀU HÀNH WINDOWS SERVER

CHƯƠNG 1: GIỚI THIỆU HỆ ĐIỀU HÀNH WINDOWS SERVER

Professional Development

103 Qs

AWS Certified Cloud Practitioner — Exam Questions (Cover Page)

AWS Certified Cloud Practitioner — Exam Questions (Cover Page)

Professional Development

102 Qs

99-199

99-199

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Hard

Created by

Chiến Tạ Quang

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB, which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mib or by entering the DNS library name and Lseries.mib. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?

LNMIB2.MIB
DHCP.MIB
MIB_II.MIB
WINS.MIB

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?

ophcrack
VisualRoute
Hootsuite
HULK

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______ to encrypt the message, and Bryan uses _______ to confirm the digital signature.

Bryan's public key; Bryan's public key
Alice's public key; Alice's public key
Bryan's private key; Alice's public key
Bryan's public key; Alice's public key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

AndroidManifest.xml
classes.dex
APK.info
resources.asrc

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

NetPass.exe
Outlook scraper
WebBrowserPassView
Credential enumerator

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Bluesmacking
Bluesnarfing
Bluejacking
Bluebugging

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, "Learn more about your friends!", as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions on the post. A few days later, Matt's bank account has been accessed, and the password has been changed. What most likely happened?

Matt inadvertently provided the answers to his security questions when responding to the post.
Matt inadvertently provided his password when responding to the post.
Matt's computer was infected with a keylogger.
Matt's bank-account login information was brute forced.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?