CyberOps Chap24

CyberOps Chap24

University

8 Qs

quiz-placeholder

Similar activities

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Network Fundamentals-Introduction to Networks Part 1

Network Fundamentals-Introduction to Networks Part 1

9th Grade - University

8 Qs

network topology

network topology

University

10 Qs

Quiz Jaringan Komputer

Quiz Jaringan Komputer

University

10 Qs

UBL JARKOM CHAP6

UBL JARKOM CHAP6

University

10 Qs

Pre Test ITN

Pre Test ITN

University

10 Qs

Kuis 3

Kuis 3

University

10 Qs

DITN13 CLC Networking for Cloud Computing

DITN13 CLC Networking for Cloud Computing

University

11 Qs

CyberOps Chap24

CyberOps Chap24

Assessment

Quiz

Computers

University

Easy

Created by

Monarjay Malbog

Used 4+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method allows VPN traffic to remain confidential?

Encryption

Verification

Authentication

Encapsulation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?

Time-stamp Request

Echo Reply

Router Advertisement

Echo Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server would support the SMTP, POP, and IMAP protocols?

Proxy

Syslog

Email

DHCP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service synchronizes the time across all devices on the network?

NTP

Netflow

SNMP

Syslog

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would be used if a threat actor was using NTP to direct DDoS attacks?

25

123

443

69

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

POP3

SMTP

IMAP4

HTTP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of server daemon accepts messages sent by network devices to create a collection of log entries?

Syslog

AAA

SSH

NTP

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of server can threat actors use DNS to communicate with?

web

NTP

database

CnC