Search Header Logo

Esec exam

Authored by Saniii Saniii

Computers

University

Used 4+ times

Esec exam
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

78 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

  • ipconfig /flushdns

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Event Viewer

  • Add or Remove Programs

  • System Restore

  • Task Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

  • a MAC address

  • a username and password

  • a security encryption key

  • an updated wireless driver

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an attacker want to spoof a MAC address?

  • so that the attacker can launch another type of attack in order to gain access to the switch

  • so that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached

  • so that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host

  • so that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

  • personal

  • enterprise

  • shared key

  • WEP

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three functions provided by the syslog service? (Choose three.)

  • to select the type of logging information that is captured

  • to provide traffic analysis

  • to specify the destinations of captured messages

  • to provide statistics on packets that are flowing through a Cisco device

  • to gather logging information for monitoring and troubleshooting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?

  • access

  • denial of service

  • reconnaissance

  • information theft

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers