Episode-07: Features Questions Related to Network Security, System Administrator, VPN, Docker and more…

Questions:

  1. In Network Security, what does AAA stands for

A.  Authority, Authentication, Auditing.
B.  Authentication, Auditing, Authorization.
C.  Authentication, Authorization, Accounting.
D.  Authorization, Authentication, Accounting.
E.   None of the Above.
F. All of the Above.

      Answer: (Option C).

  1.  As a security expert, which best method describes the active enumeration of services on a network?

A. Dumpster Diving.
B.  Security Headers.
C.  Post Exploitation.
D.  Port Scanning.
E.  None of the Above.
F. All of the Above.

    Answer: (Option D).

  1. Which of the following pair of protocols is associated with AAA in network security?

A. TCP/IP & ICMP.
B. TCP/IP & RADIUS.
C.   TCP/IP & PPP.
D.   RADIUS & TACACS+.
E.   None of the Above.
F. All of the Above.

   Answer: (Option D).

  1. As a System Administrator, which of the following commands is suitable in detecting open services or open ports in windows OS?

A. netstat –antp.
B. sudo netstat –antp | grep “LISTEN”.
C.   netstat –a | findstr “LISTEN”.
D. netstat –a | findstr .
E.   None of the Above.
F. All of the Above.

Answer: (Option C).

Episode 7-Video: A Detailed description of the various options given in the Q & A episode…

 

  1. Which of the following describes how a VPN or Proxy keeps your IP address anonymous ?

A.   Alters your Local IP address 127.0.0.1 to Google.com.
B.   Changes your IP address to the localhost IP address of the VPN or Proxy.
C.   Replacing your IP address, with blackl*sted proxies.
D.   Replaces your public IP address, with the public address of the VPN.
E.   None of the Above.
F. All of the Above.

Answer: (Option D).

  1. Which of the following docker command’s exposes the docker container my-app to the public internet of the user Cookie on port 8000?

A. docker run -dp 127.0.0.1:4545:5000 Cookie/my-app.
B. docker run -dp 0.0.0.0:8000:8000 Cookie/my-app.
C.   docker run -dp 127.0.0.1:8000:3000 Cookie/my-app.
D.  docker run -dp 0.0.0.0:3000:3000 Cookie/my-app.
E.   None of the Above.
F. All of the Above.

Answer: (Option B).

  1. In C-programming which of the following describes method used in importing a file called mytest?

A.  import mytest.
B.  import mytest.c.
C.  #include <mytest>.
D.  #include “mytest.c”.
E.   None of the Above.
F.  All of the Above.

Answer: (Option D).

  1. Your organization reported an incident that has the account of an admin compromised, by a hacker through  a lower-level staff who was giving rights to stored keys in a classified file. Which human error lead to this ?
    A.  System Misconfiguration.
    B.  Default Usernames and Passwords.
    C.  Lost Laptops and Mobiles.
    D.  Clicking a Malicious Link.
    E.   None of the Above.
    F.   All of the Above.

Answer: (Option A).

  1. Which of the following describes a  Stored XSS  Vulnerability?

A.  Is a malicious payload injected in a web-application.
B. This malicious payload are JavaScript based.
C.  They are sometimes stored on the victim’s server database.
D.   A& B.
E.   None of the Above.
F. All of the Above.

Answer: (Option D).

  1. Which of the following Framework is PHP Based?

A.  Laravel.
B.  Zikula.
C.   Qcodo.
D.  Silex.
E.   None of the Above.
F. All of the Above.

Answer: (Option F).

 

 

Put your comments below in the comment section on your thoughts about this.

Find this article and information helpful? Show some love and support  “Click-Here”
5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments