Cyber Quest Final Assessment

35 Questions | Total Attempts: 149

SettingsSettingsSettings
Please wait...
Internet Quizzes & Trivia

Questions and Answers
  • 1. 
    Which command would be used to determine that your computer can communicate with another one?
    • A. 

      Dir

    • B. 

      Ping

    • C. 

      Ls

    • D. 

      Hello

  • 2. 
    Which of the following is NOT an operating system?
    • A. 

      Windows

    • B. 

      Linux

    • C. 

      Unix

    • D. 

      Excel

  • 3. 
    Which of the following is a valid, complete, IPv4 address?
    • A. 

      34.2.45

    • B. 

      44.23.2.45

    • C. 

      4.34.300.200

    • D. 

      Www.google.com

  • 4. 
    In Linux, what command would you use for determining the files in a directory?
    • A. 

      Pwd

    • B. 

      Df

    • C. 

      Ls

    • D. 

      Man

  • 5. 
    What device’s primary purpose is to limit network access?
    • A. 

      Router

    • B. 

      Switch

    • C. 

      Firewall

    • D. 

      Gateway

  • 6. 
    A virtual machine is:
    • A. 

      One operating system running in software that is running in another operating system

    • B. 

      A computer with no keyboard

    • C. 

      A computer connected to the internet

    • D. 

      A computer that can boot into multiple operating systems

  • 7. 
    Which best describes a process in Linux?
    • A. 

      A set of executable code

    • B. 

      A currently running instance of a program

    • C. 

      A collection of files

    • D. 

      The location of a file in the file system

  • 8. 
    Which of the following is an executable file, given their output from the ls -al command?
    • A. 

      -rw-rw-rw- 1 user user 3391 Mar 15 2013 myfile.txt

    • B. 

      -rw--r--r-- 1 nobody user 7099 Apr 2 13:58 logfile

    • C. 

      Drwxr-xr-x 1 user user 4096 Mar 15 2013 Desktop

    • D. 

      -rwxr-xr-x 1 root root 145320 Jun 10 2012 less

  • 9. 
    Which command would you use to make it so a process no longer runs?
    • A. 

      Stop

    • B. 

      Kill

    • C. 

      Man

    • D. 

      Ps

  • 10. 
    Processes that are capable of handling requests that come over the network will be listening for requests on:
    • A. 

      A user account

    • B. 

      A port

    • C. 

      A directory

    • D. 

      A name

  • 11. 
    The IPv4 Domain Name System (or DNS) is responsible for:
    • A. 

      Mapping ports to processes

    • B. 

      Mapping MAC addresses to IP address

    • C. 

      Mapping an IP address to a human readable name

    • D. 

      Mapping users to computers

  • 12. 
    Another name for a folder is:
    • A. 

      A directory

    • B. 

      A file

    • C. 

      An IP address

    • D. 

      A process

  • 13. 
    Which of the following commands will take the output of the ls command and put it in a file name output.txt?
    • A. 

      Output.txt < ls

    • B. 

      Ls > output.txt

    • C. 

      Ls | output.txt

    • D. 

      Ls output.txt

  • 14. 
    Which network mask would work for a network that had 200 computers on the same subnet?
    • A. 

      255.255.255.0

    • B. 

      255.255.255.128

    • C. 

      255.255.255.192

    • D. 

      255.255.255.252

  • 15. 
    The following is a listing for a file. What are the user/group assignments for this file?   drwxr-xr-x 1 nobody root 4096 Mar 15 2013 Desktop
    • A. 

      User of nobody, group of root

    • B. 

      User of root, group of nobody

    • C. 

      User and group of nobody

    • D. 

      User and group of root

  • 16. 
    In Linux, the top level (or root) directory is:
    • A. 

      C:\

    • B. 

      /usr

    • C. 

      /bin

    • D. 

      /

  • 17. 
    A common name for the account with full privileges in Linux is:
    • A. 

      Nobody

    • B. 

      User

    • C. 

      Root

    • D. 

      Www

  • 18. 
    The command to change your current working directory, to the directory above it is:
    • A. 

      Ls ..

    • B. 

      Cd ..

    • C. 

      Cd

    • D. 

      Cd /

  • 19. 
    Which of the following prefixes is common for encrypted web pages?
    • A. 

      Http:

    • B. 

      Https:

    • C. 

      Ftp:

    • D. 

      Smtp:

  • 20. 
    When authenticating a user, which of the following can be used?
    • A. 

      Something the user has

    • B. 

      Something the user is

    • C. 

      Something the user knows

    • D. 

      Any of the above

  • 21. 
    Which of the following is NOT used to move packets from one computer to another?
    • A. 

      Router

    • B. 

      Switch

    • C. 

      Network attached storage

    • D. 

      Gateway

  • 22. 
    Which of the following can be part of securing an operating system?
    • A. 

      Applying patches

    • B. 

      Applying updates

    • C. 

      Applying service packs

    • D. 

      All of the above

  • 23. 
    A terminal is an example of:
    • A. 

      A command line interface

    • B. 

      A GUI interface

  • 24. 
    To remotely determine what services may be running on a server, a common technique is:
    • A. 

      To ping the server

    • B. 

      Port scanning the server

    • C. 

      Getting a directory listing

    • D. 

      Opening a file

  • 25. 
    Operating system passwords are generally stored as:
    • A. 

      As clear text

    • B. 

      Unencrypted

    • C. 

      Hashed

    • D. 

      Reversibly encrypted

Back to Top Back to top