Esec exam

Esec exam

University

78 Qs

quiz-placeholder

Similar activities

QUIZZ RESEAU SISR SEMESTRE 1

QUIZZ RESEAU SISR SEMESTRE 1

University

76 Qs

Đề Cương Ôn Tập Tin Học 11 Cuối Học Kì 2

Đề Cương Ôn Tập Tin Học 11 Cuối Học Kì 2

11th Grade - University

80 Qs

Квиз по Бэкенд-разработке

Квиз по Бэкенд-разработке

University

80 Qs

WebDev

WebDev

University

79 Qs

1er Examen Parcial de ITIL - DASC Master Degree

1er Examen Parcial de ITIL - DASC Master Degree

University - Professional Development

79 Qs

Word Within The Word Lists 1-3

Word Within The Word Lists 1-3

3rd Grade - University

75 Qs

Dynamic Programming

Dynamic Programming

University

82 Qs

Piggy Update Wave 3 :)

Piggy Update Wave 3 :)

KG - Professional Development

81 Qs

Esec exam

Esec exam

Assessment

Quiz

Computers

University

Medium

Created by

Saniii Saniii

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

78 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

  • ipconfig /flushdns

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Event Viewer

  • Add or Remove Programs

  • System Restore

  • Task Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

  • a MAC address

  • a username and password

  • a security encryption key

  • an updated wireless driver

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an attacker want to spoof a MAC address?

  • so that the attacker can launch another type of attack in order to gain access to the switch

  • so that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached

  • so that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host

  • so that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

  • personal

  • enterprise

  • shared key

  • WEP

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three functions provided by the syslog service? (Choose three.)

  • to select the type of logging information that is captured

  • to provide traffic analysis

  • to specify the destinations of captured messages

  • to provide statistics on packets that are flowing through a Cisco device

  • to gather logging information for monitoring and troubleshooting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?

  • access

  • denial of service

  • reconnaissance

  • information theft

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?