0% found this document useful (0 votes)
193 views

Network Security Source 3

This document contains a midterm quiz covering topics related to networking, security, and system administration. It consists of 15 multiple choice or fill-in-the-blank questions testing knowledge of concepts like disabling network ports, hardening systems, file systems, group policy, and network services. No answers are provided, just feedback for each question indicating if the answer was correct or not and sometimes specifying the right answer.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
193 views

Network Security Source 3

This document contains a midterm quiz covering topics related to networking, security, and system administration. It consists of 15 multiple choice or fill-in-the-blank questions testing knowledge of concepts like disabling network ports, hardening systems, file systems, group policy, and network services. No answers are provided, just feedback for each question indicating if the answer was correct or not and sometimes specifying the right answer.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Midterm quiz 1

Question 1
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Which of the following are the commands for disabling a port in a Network
Switch. Choose any that Apply

Select one or more:


a. SWITCH>enable
SWITCH#configure terminal
SWITCH(config)#interface f0/2
SWITCH(config-if)#no shutdown
b.
SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#no shutdown
c. SWITCH>enable
SWITCH#config term
SWITCH(config)#interface range f0/4-8
SWITCH(config-if-range)#shutdown
d. SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#shutdown
Feedback
Your answer is incorrect.
The correct answers are: SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#shutdown, SWITCH>enable
SWITCH#config term
SWITCH(config)#interface range f0/4-8
SWITCH(config-if-range)#shutdown
Question 2
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
is a crucial security update that you should always apply to your system

Select one:
a. Patch
b. Service pack
c. Security hot-fix
Feedback
Your answer is incorrect.
The correct answer is: Security hot-fix
Question 3
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
NTFS and FAT/FAT32 is an example of?

Answer:
Feedback
The correct answer is: File System
Question 4
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
This service is the one responsible for handling connections to a remote network
resources.

Select one:
a. Workstation service
b. Print Spooler service
c. Messenger service
d. Server service
Feedback
Your answer is incorrect.
The correct answer is: Workstation service
Question 5
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Two Categories of a Group Policy. Choose any that apply.

Select one or more:


a. User settings
b. Account settings
c. Computer settings
d. Security settings
Feedback
Your answer is incorrect.
The correct answers are: Computer settings, User settings
Question 6
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a core feature of Windows that allow the network administrator to enable
and disable different features in Windows

Answer:
Feedback
The correct answer is: Group Policy
Question 7
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Without this service on your environment, you won't be able to share any of your
resources

Select one:
a. Workstation service
b. Messenger service
c. Print Spooler service
d. Server service
Feedback
Your answer is incorrect.
The correct answer is: Server service
Question 8
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Which of the following are not part of the steps in order to harden your system.
Choose only one.
Select one:
a. Patch System
b. Disable Unnecessary Services
c. Uninstall Necessary Software
d. Disable or Remove Unnecessary Accounts
Feedback
Your answer is incorrect.
The correct answer is: Uninstall Necessary Software
Question 9
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Which of the following are the commands for disabling a port in a Network
Switch. Choose any that Apply

Select one or more:


a. SWITCH>enable
SWITCH#configure terminal
SWITCH(config)#interface f0/2
SWITCH(config-if)#no shutdown
b. SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#shutdown
c. SWITCH>enable
SWITCH#config term
SWITCH(config)#interface range f0/4-8
SWITCH(config-if-range)#shutdown
d.
SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#no shutdown
Feedback
Your answer is incorrect.
The correct answers are: SWITCH 1>enable
SWITCH 1#configure terminal
SWITCH 1(config)#interface f0/2
SWITCH 1(config-if)#shutdown, SWITCH>enable
SWITCH#config term
SWITCH(config)#interface range f0/4-8
SWITCH(config-if-range)#shutdown
Question 10
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a standard configuration that is approved by any company for a specific
type of system or device for being secure

Select one:
a. Security baseline
b. Configuration Baseline
c. File System
d. Security
Feedback
Your answer is incorrect.
The correct answer is: Security baseline
Question 11
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a software service that manages the process of printing in the Windows
environment.

Select one:
a. Server service
b. Print Spooler service
c. Workstation service
d. Messenger service
Feedback
Your answer is incorrect.
The correct answer is: Print Spooler service
Question 12
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
File system that has a features like permissions, encryption, quotas, and
auditing services.

Answer:
Feedback
The correct answer is: NTFS
Question 13
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
A popular feature of Windows that allows you to harden multiple systems quickly.

Answer:
Feedback
The correct answer is: Security Templates
Question 14
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Is a service responsible for sending messages to other computers or users.

Select one:
a. Messenger service
b. Server service
c. Print Spooler service
d. Workstation service
Feedback
Your answer is incorrect.
The correct answer is: Messenger service
Question 15
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It ensure that the essential and vital services are only running on the system

Answer:
Feedback
The correct answer is: Services running

Midterm quiz 2

Question 1
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Large volume of data is also known as

Answer:
Feedback
The correct answer is: Big Data
Question 2
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a security concern because most scripting languages can make some
alteration to your system.

Select one:
a. Scripting
b. Cross-site scripting
c. Java
d. Cookies
Feedback
Your answer is incorrect.
The correct answer is: Scripting
Question 3
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is the idea of developing a database system to store and retrieve large
volumes of data

Answer:
Feedback
The correct answer is: NoSQL databases
Question 4
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Developers should always implement validation at both the client and the server
to obtain high level of security.

Select one:
True
False
Feedback
The correct answer is 'True'.
Question 5
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
very single application must go through the options and check whether each
application is configured in the most secure state.

Select one:
True
False
Feedback
The correct answer is 'True'.
Question 6
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
To avoid and prevent this type of attack, users should always choose the
“Remember Me” option when logging in to any web site.

Select one:
True
False
Feedback
The correct answer is 'False'.
Question 7
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a special system used in industrial environments and settings to monitor
their operations

Select one:
a. Mainframe
b. SCADA
c. Embedded
d. Android
Feedback
Your answer is incorrect.
The correct answer is: SCADA
Question 8
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It can manipulate your system including the deletion of the important files on
your computer.

Answer:
Feedback
The correct answer is: ActiveX controls
Question 9
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
These are logon information from all the websites you visit and is stored in
memory on computer

Answer:
Feedback
The correct answer is: Cookies
Question 10
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is a restricted area with a resource that these Java applications can access.

Select one:
a. Scripting
b. Sandbox
c. Java
d. ActiveX controls
Feedback
Your answer is incorrect.
The correct answer is: Sandbox
Question 11
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
Always disable unnecessary features of the web server that are not going to be
used

Select one:
True
False
Feedback
The correct answer is 'True'.
Question 12
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is another term for a runtime error

Answer:
Feedback
The correct answer is: Exception
Question 13
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
The following codes is an example of?

Try

MessageBox.Show(cdbl(txtTotalValue.text) + cdbl(txtTotalVAT.text))

Catch ex as InvalidCastException

MessageBox.Show("Please supply 2 numbers as input")

Catch ex as Exception

MessageBox.Show("An error has occurred. Please try again.")

End Try

Select one:
a. handling errors
b. try/catch block
c. Exception handling
d. block syntax
Feedback
Your answer is incorrect.
The correct answer is: try/catch block
Question 14
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
It is an advanced method of handling an error.

Answer:
Feedback
The correct answer is: Exception handling
Question 15
Not answered
Marked out of 1.00
Not flaggedFlag question
Question text
SMTP and FTP are used to transfer information over a computer network.

Select one:
True
False
Feedback
The correct answer is 'True'.

You might also like