A system administrator is a person who manages the IT system and responsible for optimizing the IT services, Networking Servers and support systems. In large Organizations, a system administrator administers the online data or cloud computing services to secure the network and prevent from the security breach or hacking. This quiz has been developed to test your knowledge about system See moreadministration and servers. So, let's try out the quiz. All the best!
Honeypot
Bastion host
IDS
Sandbox
Rate this question:
Zoning
Defense-in-depth
Logical segmentation
Network hardening
Rate this question:
ISCSI
SSH
IPSec
SCP
Rate this question:
CHAP
EAP
PAP
MS-CHAP
Rate this question:
A risk
An exploit
A threat
A vulnerability
Rate this question:
In the same subnet as the other servers
In the production VLAN
In a DMZ
In a separate VLAN
Rate this question:
Use RAID 0 Arrays on the servers
Use RAID 5 arrays on the servers
Use RAID 10 arrays on the servers
Use network-based backup tools to perform weekly full backups
Use tape backups and restore to a warm site during a failover
User clustered replication of the email database for failover
Rate this question:
SELinux
Containers
Iptables
Trusted Solaris
Rate this question:
Choose devices without removable storage to prevent easy removal of data
Ensure company devices are encrypted to prevent data seizure if an image is taken
Disable certain features on the phone to prevent misuse of company device
Have a remote wiping policy so if the device is stolen, the data is unrecoverable
Rate this question:
HSM
TPM
SMS OTP
HOTP
TOTP
Rate this question:
PAP
CHAP
SAML
EAP
Rate this question:
Periodic user account audits
User assigned privileges
Continuous alert monitoring
Biometric user authentication
Rate this question:
Store the sensitive records using symmetric encryption
Implement an ACL that prevents the web server from accessing the sensitive records
Hash the sensitive records before storing them in the database
Store the sensitive records using irreversible encryption
Rate this question:
HIPS
NAC
WAF
NIDS
Rate this question:
Proxy server
Network segmentation
Intrusion prevention system
Web application firewall
Rate this question:
Implement an application whitelist on the workstation
Install a HIDS
Turn on DEP, SEHOP, and ASLR on the workstation’s OS
Air gap the professor’s workstation
Create a VM on the workstation
Install antivirus and anti-malware software
Rate this question:
Controls data audits
Entry log audits
Access log audits
Security log audits
Rate this question:
Password recovery
Lockout period
Increased complexity
Limited reuse
Account disablement
Rate this question:
Whitelisting
Patching
Blacklisting
Sandboxing
Rate this question:
Implement database failover to assist in managing session states
Migrate the ERP environment to a mirrored storage solution
Increase the memory on the database server
Update the software to the current patch level
Rate this question:
Incident response plan
Backup plan
Disaster recovery plan
Business impact analysis
Rate this question:
Rogue machine detection
IDS
Network firewall
HIPS
Rate this question:
XSRF
SQL injection
XSS
Session hijacking
Rate this question:
Calcs
Ls –la
Setfacl
Getfacl
Rate this question:
Install a firewall to segregate finance form the sales network, place alarm motion detectors on the ground floor and securely back up finance data
Install firewall to segregate finance from the sales network, place security guards in the ground floor foyer, and provision a cold site for data redundancy
Install a HIDS on all the finance department’s PCs, place alarm motion detectors on the ground floor and provision a warm site for redundancy
Install an IDS to detect malicious users, place security guards in the ground floor foyer and provision a hot site for data redundancy
Rate this question:
Ann’s public key
Ann’s private key
Joe’s private key
Joe’s public key
Rate this question:
SSH
DNS
Telnet
SCP
TFTP
Rate this question:
Piggybacking
Tailgating
Impersonation
Shoulder surfing
Rate this question:
False positives
False negatives
Exploited anomaly
Malicious logic
Rate this question:
Strong authentication with a hardware component
MAC-based network authentication
Annual technology refresh cycle
Installing a guest network with WPA2
Drafting a clear BYOD policy
Disabling SSID broadcast and using RF shielding
Rate this question:
Confidentiality
Integrity
Availability
Redundancy
Rate this question:
Encrypt the wireless points using WPA2
Disable SSID broadcast
Use MAC filtering based on company devices
Change the antenna placement
Perform a site survey
Add the MA addresses for the employee’s personal devices to a filter
Add the IP addresses for the employee’s personal devices to a filter
Revoke the Kerberos tickets assigned to the employee’s devices
Revoke the WPA2 enterprise credentials assigned to the employee’s personal devices
Rate this question:
EAP
LEAP
MS-CHAPv2
Blowfish
Diffie-Hellman
Rate this question:
CRL
OCSP
Key escrow
CA
Rate this question:
File integrity monitor
SIEM
DMZ
Local RAID drive
Rate this question:
URL filter
Spam filter
Protocol analyzer
Web application firewall
Rate this question:
Incident management
Change management
Data loss prevention
Routine audits
Rate this question:
Input validation
Whitelisting
Error and exception handling
Access control list
Rate this question:
Blowfish in counter mode
RIPEMD using electronic code book
DES using cipher feedback
3DES using Galois counter mode
Rate this question:
NIDS
Baseline analyzer
File integrity monitoring
SIEM
Rate this question:
Create “deny” rules for all applications with a specific file hash
Create “deny” rules for all applications with a specified file path
Create “allow” rules for applications signed with a specific digital signature
Create “allow” rules for applications with a specific file extension
Create “allow” rules for applications within a specified file path
Create “deny” rules for applications signed with a specific digital signature
Rate this question:
MAC
Rule-based access control
DAC
Role-based access control
Rate this question:
Input validation
Whitelisting
Error and exception handling
Access control list
Rate this question:
Getfacl /home/username
Setfacl /home/username
Ls –lz /home/username
Getfacl –l /home
Rate this question:
Host-based IPS
Signature-based IPS
URL filtering
Network-based content inspection
Rate this question:
Single sign-on access
Smart card
Access control
Multifactor authentication
Rate this question:
Remove line 10
Remove line 30
Change the protocol to TCP on line 30
Remove line 40
Change the port to 514 on line 50
Change the port to 995 on line 20
Change the port to 8080 on line 60
Rate this question:
Quiz Review Timeline (Updated): May 20, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.