The 'Keep your Job Quiz' assesses knowledge on networking tools and protocols, including command usage, protocol standards, and IP addressing. Essential for IT professionals, this quiz enhances understanding of network management and security.
It assigned and manages leases of IP address within a network
It provides public-facing web pages
It resolve IP addresses to Fully Qualified Domain Names (FDON)
It collects and stores logs from Network infrastructure devices
Rate this question:
Reconnaissance
Initial access
Entrenchment
Abuse
Rate this question:
Authentication attack that will try every word from a compiled list against the password Quarry
Unexpected input designed to trick a database server into yielding information
Purposeful overflow of data that are injected into a memory space to trick a CPU into executor malicious commands
Strategically worded e-mail designed to trick a recipient into opening an attachment or following a link
Rate this question:
Entrenchment
Initial access
Reconnaissance
Abuse
Rate this question:
Netstat
Pslist
Ifconfig
Nslookup
Rate this question:
SSH (TCP 80)
Telnet (TCP 23)
FTP (TCP 21)
DNS (TCP/UDP 53)
Rate this question:
TCP. PORT==23
Port EQUALS 23
TCP PORT == 3389
UDP.DEST == 3389
Rate this question:
Network address translation (NAT)
Port address translation (PAT)
Subdomains
IP addresses assignments
Rate this question:
Threatscape
Threat
Entrenchment
Phases of an Intrusion
Rate this question:
10.10.5.5
218.5.78.15
174.123.26.5
23.15.8.209
Rate this question:
The client system's source port usually between 49152 to 65535
Any port between 0 and 65,535
A physical Port used to connect a network cable to computer
Any port between 0 and 1024 used to designate for core Network Services
Rate this question:
NetFlow
SYSlog
Telnet
Wireshark
Rate this question:
192.168
192
192.168.10
192.168.10.5
Rate this question:
A lightweight command line utility for downloading files via http
And Export delivery and management tool within the met Metasploit framework
My wheels are systematically calls out to a specific IP address or URL
A command line tool for a password cracking
Rate this question:
In the Domain Name System (DNS) hierarchy, a second-level domain (SLD) is a domain that is directly below a top-level domain (TLD)
A country code top-level domain = ccTLD
A program that uses existing computer scripts or code to hack into computers
It is a elevated Domain privileges of existing domain account
Rate this question:
They are typically after intellectual properties and/or sensitive information
They can be a military unit or a Nations supported group
They are not organized and have no real agenda
Their goal is to publicly Deface government web site
Rate this question:
Send all traffic in clear text
Provides a command line remote Administration in Shell
Assigns and manages IP addresses within a network
Allows for requests and responses between browsers and web servers
Rate this question:
It is a connection oriented-protocol
It is used the "three-way handshake" to establish connection
IT sends packets without maintaining any sense of communication
It is used for delivery of time-sensitive content such as real time audio
Rate this question:
DNS queries
Entrenchment
Active reconnaissance
Passive reconnaissance
Rate this question:
Entrenchment
Passive reconnaissance
Active reconnaissance
Initial access
Rate this question:
A weakness or flaw in software hardware or process allows unanticipated
A possible source of danger for an information system
A tool an attacker use to gain access to an information system
The act of executing unauthorized actions against an information system
Rate this question:
SYSlog
Subdomains
Sniffer
Network infrastructure
Rate this question:
Logon credentials for domain users
Ability to create new domain accounts
Logon credentials for local machine accounts
Elevate Domain privileges of existing domain account
Entry keypad codes for building access
Rate this question:
Sniffer
Protocol analyzer
Network infrastructure device log collector
Intrusion Detection System (IDS)
Rate this question:
The computer seeking the service assumes the role of the client.
The computer receiving the request assumes the role of the server.
The client sends a connection request for a particular service (or port) to the server.
Applications use communication protocols to talk to other relevant applications in a client/server model.
Rate this question:
Ping
Tracert (Windows)
Traceroute (Linux)
Pingpath (Windows)
ARP TCP/IP
Rate this question:
Hacktivism
Natural/environmental disaster
Script kiddie Noob
Inequity spanning multiple buildings
Rate this question:
Like NAT, PAT replaces outgoing private IP addresses with a unique publicly routable address at the gateway firewall.
While NAT does a one-to-one IP address replacement, PAT does a one-to-many replacement.
Many networks may have only one publicly routable IP address at their disposal and must use it for all network-to-Internet traffic.
PAT ensure interoperability between different OSs and computing platforms, network communication is highly structured.
Rate this question:
Translate the protocol being used based on the work number
Allow for 1 to 1 private to Public Library address replacement
Explain the functionality of a specific protocol and Port combination
Allow for many private IP addresses to be replaced with a single public one
Hide a system's Network address from the outside world (internet)
Rate this question:
Allows you to connect to remote computers (called hosts) over a TCP/IP network you can make a connection to a telnet server
A telnet client establishes a connection to the remote host, so that your client becomes a virtual terminal
It is a Telnet clients that are available for all major operating systems
A multiple protocols that cover the end-to-end connectivity of systems on the Internet and similar networks.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.