Esec exam

Esec exam

University

78 Qs

quiz-placeholder

Similar activities

3.6.2016(1) key

3.6.2016(1) key

University

83 Qs

XML

XML

University

82 Qs

IP Address Quiz

IP Address Quiz

University

80 Qs

Revision 2.1 and 2.2

Revision 2.1 and 2.2

University

75 Qs

CPE 116 Exam

CPE 116 Exam

University

79 Qs

Computer skills - Chapter 2

Computer skills - Chapter 2

University

82 Qs

ESP-re: Newcastle Office upgrade 29 September 2023 exam ESP

ESP-re: Newcastle Office upgrade 29 September 2023 exam ESP

University

78 Qs

Introduction to Cloud Computing

Introduction to Cloud Computing

University

77 Qs

Esec exam

Esec exam

Assessment

Quiz

Computers

University

Medium

Created by

Saniii Saniii

Used 4+ times

FREE Resource

78 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

  • ipconfig /flushdns

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?

  • Event Viewer

  • Add or Remove Programs

  • System Restore

  • Task Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?

  • a MAC address

  • a username and password

  • a security encryption key

  • an updated wireless driver

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an attacker want to spoof a MAC address?

  • so that the attacker can launch another type of attack in order to gain access to the switch

  • so that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached

  • so that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host

  • so that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

  • personal

  • enterprise

  • shared key

  • WEP

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three functions provided by the syslog service? (Choose three.)

  • to select the type of logging information that is captured

  • to provide traffic analysis

  • to specify the destinations of captured messages

  • to provide statistics on packets that are flowing through a Cisco device

  • to gather logging information for monitoring and troubleshooting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?

  • access

  • denial of service

  • reconnaissance

  • information theft

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?