Keep Your Job Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Garciahe
G
Garciahe
Community Contributor
Quizzes Created: 1 | Total Attempts: 602
| Attempts: 602 | Questions: 31
Please wait...
Question 1 / 31
0 %
0/100
Score 0/100
1. Which command lists network connections and the Associated Process ID?

Explanation

In computing, netstat (network statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network ...

Submit
Please wait...
About This Quiz
Networking Quizzes & Trivia

The 'Keep your Job Quiz' assesses knowledge on networking tools and protocols, including command usage, protocol standards, and IP addressing. Essential for IT professionals, this quiz enhances understanding... see moreof network management and security. see less

2. Choose the best definition of a DHCP server

Explanation

A DHCP server is responsible for assigning and managing leases of IP addresses within a network. This means that it automatically assigns IP addresses to devices connected to the network and keeps track of the duration of these leases. It ensures that each device has a unique IP address and manages the allocation of addresses efficiently.

Submit
3. During which phase of an intrusion will threat agent use a variety of tools and resources to collect as much information and Target organization as it's needed to gain unauthorized access to an information system? 

Explanation

During the reconnaissance phase of an intrusion, threat agents will gather as much information as possible about the target organization and its information system. This includes using a variety of tools and resources to collect data such as IP addresses, domain names, employee information, network topology, and vulnerabilities. The purpose of reconnaissance is to identify potential entry points and weaknesses that can be exploited to gain unauthorized access to the system.

Submit
4. What is the best definition of a dictionary attack

Explanation

will try every word from a dictionary file to attempt to identify a valid credential

Submit
5. During which phase of an intrusion might a threat agent change the approved configuration of an information system configuration of an information systems enable long-term access to the system?  

Explanation

During the entrenchment phase of an intrusion, a threat agent may change the approved configuration of an information system to enable long-term access to the system. This phase involves establishing a persistent presence within the system, making it more difficult to detect and remove. By altering the configuration, the threat agent can ensure their continued access and control over the compromised system, potentially allowing them to carry out further malicious activities without being detected.

Submit
6. Which tool provide the following information? 

Explanation

Netstat is a tool that provides information about network connections and network statistics on a computer. It displays active network connections, listening ports, and various network interface statistics. Netstat can be used to troubleshoot network issues, monitor network activity, and gather information about network services and processes running on a system. It is commonly used to identify open ports, view established connections, and check network utilization.

Submit
7. Which standard protocol and Associated well-known port number combination is incorrect? 

Explanation

The correct answer is SSH (TCP 80). SSH (Secure Shell) is a standard protocol that operates on port number 22, not port number 80. Port number 80 is associated with the HTTP (Hypertext Transfer Protocol) protocol used for web browsing.

Submit
8. It is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.

Explanation

Network address translation (NAT) is a method used to remap one IP address space into another by modifying network address information in IP datagram packet headers while they are in transit across a traffic routing device. This allows multiple devices on a local network to share a single public IP address, conserving the limited supply of IPv4 addresses. NAT works by translating the private IP addresses of devices on the local network into a single public IP address when communicating with devices on the internet, and vice versa. This helps to improve network security and manage IP address allocation efficiently.

Submit
9. A properly formatted Wireshark display filter that shows telnet traffic is______. 

Explanation

The correct answer is "TCP. PORT==23". This display filter specifies that we are looking for telnet traffic, which uses TCP as the transport protocol and typically operates on port 23. By using this filter, Wireshark will only display network packets that match these criteria, allowing us to specifically analyze telnet traffic.

Submit
10. A __________ can be loosely defined as the entire breadth of potential threats. Understanding the full spectrum of possible threats can better prepare investigators for what they could expect to find.

Explanation

A "threatscape" refers to the complete range of potential threats that an investigator may encounter. It encompasses all possible threats that could pose a risk or harm to a system or organization. By understanding the threatscape, investigators can gain a comprehensive understanding of the various types of threats they may face and can better prepare themselves to identify and respond to these threats effectively.

Submit
11. A standard protocol Cisco Systems developed, collects data about network communications as those communications pass through networked routers. Unlike a sniffer,  it records vital statistics about the flow of data, not the content of the data packets themselves.

Explanation

NetFlow is a standard protocol developed by Cisco Systems that collects data about network communications as they pass through networked routers. It is different from a sniffer because it records vital statistics about the flow of data, such as source and destination IP addresses, ports, and amount of data transferred, rather than capturing the content of the data packets themselves. NetFlow provides valuable information for network monitoring, troubleshooting, and security analysis.

Submit
12. Which IP address is private and cannot be routed over the internet? 

Explanation

The IP address 10.10.5.5 is a private IP address that cannot be routed over the internet. Private IP addresses are reserved for use within private networks and are not publicly accessible. They are commonly used for internal network communication within organizations or for home networks. In contrast, the other IP addresses listed (218.5.78.15, 174.123.26.5, and 23.15.8.209) are public IP addresses that can be routed over the internet.

Submit
13. What best describes an ephemeral port?

Explanation

An ephemeral port refers to the client system's source port, which is typically assigned a value between 49152 and 65535. These ports are used for temporary connections and are dynamically allocated by the operating system for outgoing network connections. They allow multiple client applications to establish simultaneous connections to a server without conflicts.

Submit
14. What is a Second-level Domains

Explanation

For example, in example.com, example is the second-level domain of the .com TLD.

Submit
15. Given the classless inter-domain routing (CIDR) notation of 192.168.10.5/24 what would be the network ___ address? 

Explanation

The correct answer is 192.168. This is because the CIDR notation /24 indicates that the first 24 bits of the IP address are the network address. In this case, the IP address is 192.168.10.5, so the network address would be 192.168.

Submit
16. What is a wget?

Explanation

it can be used from the command line to download files and HTML pages

Submit
17. Which statement describes advanced persistent threats?

Explanation

Advanced persistent threats (APTs) are typically after intellectual properties and/or sensitive information. This means that their main objective is to gain unauthorized access to valuable data, such as trade secrets, research findings, or personal information. APTs can also be a military unit or a nation-supported group, indicating that they are often well-funded and have significant resources at their disposal. This suggests that APTs are highly organized and have a clear agenda, contradicting the statement that they are not organized and have no real agenda.

Submit
18. Modifying the Windows registry, creating AT jobs and putting malware into a windows_______.

Explanation

Entrenchment refers to the process of establishing a persistent presence within a compromised system or network. In this context, the given activities of modifying the Windows registry, creating AT jobs, and putting malware into a Windows system all contribute to achieving entrenchment. By modifying the registry, the attacker can make changes that allow the malware to run automatically, while creating AT jobs allows the malware to execute at specific times. Putting malware into the Windows system ensures that the attacker maintains control and can continue to exploit the compromised system for their malicious purposes.

Submit
19. Which statement describes Telnet?

Explanation

https://www.youtube.com/watch?v=QYe8ln4L0Rc
https://www.youtube.com/watch?v=mvzItm0KGXs

Submit
20. IP addresses an organization owns, IP addresses assignments of externally addressable domain names and organization capabilities are examples of information that may be available through the application of_______. 

Explanation

https://www.youtube.com/watch?v=eSrC-7yeF7

Submit
21. Which statements describe transmission control protocol?

Explanation

Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning that it establishes a reliable connection between two devices before data transmission. It uses the "three-way handshake" process to establish this connection, where the client sends a SYN packet, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the handshake. This ensures that both devices are ready to communicate and establishes a reliable channel for data transmission. Therefore, the given statements accurately describe TCP.

Submit
22. It is a server that can collect a standardized log format from any network device enabled to keep such logs. 

Explanation

SYSlog is a protocol used for collecting and sending log messages in a standardized format. It allows network devices to send log information to a central server for storage and analysis. This helps in monitoring and troubleshooting network issues. Therefore, a server that can collect a standardized log format from any network device enabled to keep such logs is referred to as SYSlog server.

Submit
23. What statements best describes a threat?

Explanation

A threat is best described as a weakness or flaw in software, hardware, or a process that allows unanticipated access or harm to an information system. It refers to a possible source of danger for the system, which can be exploited by attackers as a tool to gain unauthorized access and execute malicious actions.

Submit
24. What can a threat hope to gain from comprising an active directory (AD) servers list of logon credentials

Explanation

list of other logon credentials
logon credentials for Windows domain
create, modify or steal user credentials on an Active Directory.
maintain or regain access to compromised machines
logon credentials for local machine accounts
create an account on the Active Directory for themselves.
elevate Domain privileges of existing domain account
elevate the permissions of existing accounts.

Submit
25. Which are uses of Wireshark

Explanation

Also Wireshark can:

Open a variety of binary log formats
Act as a sniffer
Translate, or decode, known protocols within a binary log to human readable format
Display highly detailed information frame by frame
Search through a capture log for frames that match specific criteria
Reconstruct TCP sessions automatically
Export HTTP objects

Submit
26. The three-way handshake process is as follows:

Explanation

The three-way handshake process is a method used in computer networking to establish a connection between a client and a server. In this process, the computer seeking the service acts as the client and sends a connection request to the server. The computer receiving the request assumes the role of the server and responds to the client's request. This establishes a connection between the client and the server, allowing them to communicate and exchange data.

Submit
27. Port address translation (PAT) is used to __________

Explanation

Port Address Translation (PAT) is a technique used in networking to allow multiple devices with private IP addresses to share a single public IP address. Similar to Network Address Translation (NAT), PAT replaces the private IP addresses of outgoing traffic with a unique publicly routable address at the gateway firewall. However, unlike NAT which does a one-to-one IP address replacement, PAT performs a one-to-many replacement, allowing multiple devices to use the same public IP address. This is particularly useful when a network has only one publicly routable IP address available. PAT ensures interoperability between different operating systems and computing platforms, as network communication is highly structured.

Submit
28. Which can be classified as a cyber threat? 

Explanation

Hacktivism and natural/environmental disasters can both be classified as cyber threats. Hacktivism refers to the use of hacking techniques for political or social activism purposes, often targeting government or corporate systems. This can involve activities such as website defacement, data breaches, or distributed denial-of-service (DDoS) attacks. On the other hand, natural/environmental disasters can pose cyber threats by disrupting critical infrastructure or causing power outages, which can lead to vulnerabilities in computer systems and networks. These disruptions can be exploited by malicious actors to gain unauthorized access or cause further damage.

Submit
29. ICMP is used with several common network utilities, including:

Explanation

ICMP (Internet Control Message Protocol) is a network protocol that is used for diagnostic and error reporting purposes in IP networks. It is commonly used with various network utilities such as Ping, Tracert (Windows), Traceroute (Linux), and Pingpath (Windows). Ping is used to test the reachability of a host on an IP network and measure the round-trip time for packets to travel from the source to the destination. Tracert and Traceroute are used to trace the route that packets take from the source to the destination, helping to identify network issues. Pingpath is a Windows-specific utility that combines the functionalities of Ping and Tracert.

Submit
30. Port address translation (PAT) is used to __________

Explanation

Port address translation (PAT) is used to translate the protocol being used based on the work number, allowing for many private IP addresses to be replaced with a single public one. It also explains the functionality of a specific protocol and port combination. This allows multiple devices with private IP addresses to share a single public IP address, effectively hiding the system's network address from the outside world (internet).

Submit
31. What is telnet?

Explanation

Telnet is a network protocol that allows users to connect to remote computers, also known as hosts, over a TCP/IP network. It enables users to establish a connection to a telnet server, which then turns their client device into a virtual terminal. Telnet clients are available for all major operating systems, providing a means to remotely access and control a host computer. This protocol is part of the multiple protocols used for end-to-end connectivity of systems on the Internet and similar networks.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 22, 2017
    Quiz Created by
    Garciahe
Cancel
  • All
    All (31)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which command lists network connections and the Associated Process ID?
Choose the best definition of a DHCP server
During which phase of an intrusion will threat agent use a variety of...
What is the best definition of a dictionary attack
During which phase of an intrusion might a threat agent change the...
Which tool provide the following information? 
Which standard protocol and Associated well-known port number...
It is a method of remapping one IP address space into another by...
A properly formatted Wireshark display filter that shows telnet...
A __________ can be loosely defined as the entire breadth of potential...
A standard protocol Cisco Systems developed, collects data about...
Which IP address is private and cannot be routed over the...
What best describes an ephemeral port?
What is a Second-level Domains
Given the classless inter-domain routing (CIDR) notation of...
What is a wget?
Which statement describes advanced persistent threats?
Modifying the Windows registry, creating AT jobs and putting malware...
Which statement describes Telnet?
IP addresses an organization owns, IP addresses assignments of...
Which statements describe transmission control protocol?
It is a server that can collect a standardized log format from any...
What statements best describes a threat?
What can a threat hope to gain from comprising an active directory...
Which are uses of Wireshark
The three-way handshake process is as follows:
Port address translation (PAT) is used to __________
Which can be classified as a cyber threat? 
ICMP is used with several common network utilities, including:
Port address translation (PAT) is used to __________
What is telnet?
Alert!

Advertisement