Esec exam

Esec exam

University

78 Qs

quiz-placeholder

Similar activities

CC 111 Midterm Examination

CC 111 Midterm Examination

University

76 Qs

BDA Test - 1

BDA Test - 1

University

80 Qs

Informatika_XII

Informatika_XII

12th Grade - University

75 Qs

Nguyên lý hệ điều hành

Nguyên lý hệ điều hành

University

74 Qs

6. sınıf code.org

6. sınıf code.org

6th Grade - University

77 Qs

Mock Test 4

Mock Test 4

University

75 Qs

Latihan Soal PAT 26 April 2021

Latihan Soal PAT 26 April 2021

12th Grade - University

80 Qs

CPET 13 Pre-Midterm Exam

CPET 13 Pre-Midterm Exam

University

75 Qs

Esec exam

Esec exam

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Saniii Saniii

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

78 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

  • ipconfig /flushdns

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Event Viewer

  • Add or Remove Programs

  • System Restore

  • Task Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

  • a MAC address

  • a username and password

  • a security encryption key

  • an updated wireless driver

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an attacker want to spoof a MAC address?

  • so that the attacker can launch another type of attack in order to gain access to the switch

  • so that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached

  • so that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host

  • so that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

  • personal

  • enterprise

  • shared key

  • WEP

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three functions provided by the syslog service? (Choose three.)

  • to select the type of logging information that is captured

  • to provide traffic analysis

  • to specify the destinations of captured messages

  • to provide statistics on packets that are flowing through a Cisco device

  • to gather logging information for monitoring and troubleshooting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?

  • access

  • denial of service

  • reconnaissance

  • information theft

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?