Time limit: 0
Quiz Summary
0 of 16 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 16 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.π
Practice makes you perfect! π -
Congratulations! π₯³
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.βοΈ
Good luck with the exam! Stay strong.π
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 16
1. Question
Assuming you are working on a Windows environment. For troubleshooting reasons, you need to discover your IP information, including DHCP and DNS server addresses from your current workstation.
Which of the following commands will help you to troubleshoot the network?
CorrectIncorrect -
Question 2 of 16
2. Question
Assuming you are working on a Windows environment, what command will you type to identify the number of hops and the time it takes for a packet to travel between your local computer and your web server?
CorrectIncorrect -
Question 3 of 16
3. Question
You have noticed that the email server doesnβt work. Your manager said that someone from the company changed the DNS records (MX) of the email server.
Which of the following commands will you type to find the new MX records of the server?
CorrectIncorrect -
Question 4 of 16
4. Question
PC1 can ping the printer on the Marketing team network but canβt ping the printer on the Sales team network. Assuming you are working on a Linux environment, which of the following command would you type to get details about the route that packets go through from PC1 to the printer on the Sales team network?
CorrectIncorrect -
Question 5 of 16
5. Question
Which of the following tools can you use to perform manual DNS lookups? Assuming you are working on a Linux environment. (Choose all that apply)
CorrectIncorrect -
Question 6 of 16
6. Question
You need to mitigate all the networking attacks that exploit open unused TCP ports on your system.
Which of the following command displays active TCP connections and ports on which the computer is listening?
CorrectIncorrect -
Question 7 of 16
7. Question
The log file of your company’s network status is updated frequently, and the most critical information is on the first five lines. You want to avoid opening the entire file each time, only to view the first five lines.
What command will you use to view only the first five lines of the log file?
CorrectIncorrect -
Question 8 of 16
8. Question
Wireshark is a command-line utility that allows you to capture and analyze network traffic going through your system. It is often used to help troubleshoot network issues, as well as a security tool. (True/False)
CorrectIncorrect -
Question 9 of 16
9. Question
Which of the following process is designed to protect personnel or assets and make sure they can function quickly when a disaster strikes (natural disasters, cyber-attacks)?
CorrectIncorrect -
Question 10 of 16
10. Question
Which of the following process describes how long businesses need to keep a piece of information (a record), where itβs stored, and how to dispose of the record when its time?
CorrectIncorrect -
Question 11 of 16
11. Question
Your company is using Wireshark as a network protocol analyzer. The workstation with an IP address of 192.168.0.6 consumes too much bandwidth from the network without an obvious reason. Which of the following filters should you use to display packets to or from the IP address of 192.168.0.6?
CorrectIncorrect -
Question 12 of 16
12. Question
You just completed an HPING scan and received the following output:
HPING 4.2.2.1 (eth1 4.2.2.1): S set, 40 headers + 0 data bytes len=46 ip=4.2.2.1 ttl=56 DF id=32839 sport=50 flags=RA seq=0 win=0 rtt=264.3 ms len=46 ip=4.2.2.1 ttl=56 DF id=32840 sport=51 flags=RA seq=1 win=0 rtt=277.6 ms len=46 ip=4.2.2.1 ttl=56 DF id=32841 sport=52 flags=RA seq=2 win=0 rtt=285.4 ms len=46 ip=4.2.2.1 ttl=56 DF id=32842 sport=53 flags=SA seq=3 win=49312 rtt=270.7 ms len=46 ip=4.2.2.1 ttl=56 DF id=32843 sport=54 flags=RA seq=4 win=0 rtt=225.1 ms len=46 ip=4.2.2.1 ttl=56 DF id=32844 sport=55 flags=RA seq=5 win=0 rtt=202.6 ms len=46 ip=4.2.2.1 ttl=56 DF id=32845 sport=56 flags=RA seq=6 win=0 rtt=196.7 ms
Based on these results, which of the following services returned an SYN-ACK?
CorrectIncorrect -
Question 13 of 16
13. Question
A company follows the data retention policy as it is a framework of rules for holding, storing, and deleting the information it generates. The company’s policy states the accounting-related data is stored for a period of 3 years before the permanent deletion. Which of the following process does the company follow to destroy the data?
CorrectIncorrect -
Question 14 of 16
14. Question
You are conducting a log review scan to detect the users who have been locked out from their accounts in order to proceed to the recovery stage. Which of the following sources of information would provide you with the most accurate information for you to use in determining who has been locked out or not?
CorrectIncorrect -
Question 15 of 16
15. Question
Which of the following sources of information would provide you with the most accurate information for you to use in determining which network service has been stopped working on the company’s network?
CorrectIncorrect -
Question 16 of 16
16. Question
The IT team of a company has just implemented a bandwidth monitoring solution to identify alarming and sudden network spikes in their network traffic. What might be the cause of the unusual network spikes in their network? (Choose all that apply.)
CorrectIncorrect