Search Header Logo

CyberOps Chap24

Authored by Monarjay Malbog

Computers

University

Used 4+ times

CyberOps Chap24
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method allows VPN traffic to remain confidential?

Encryption

Verification

Authentication

Encapsulation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?

Time-stamp Request

Echo Reply

Router Advertisement

Echo Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server would support the SMTP, POP, and IMAP protocols?

Proxy

Syslog

Email

DHCP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service synchronizes the time across all devices on the network?

NTP

Netflow

SNMP

Syslog

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would be used if a threat actor was using NTP to direct DDoS attacks?

25

123

443

69

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

POP3

SMTP

IMAP4

HTTP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server daemon accepts messages sent by network devices to create a collection of log entries?

Syslog

AAA

SSH

NTP

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?