Last Updated on May 29, 2019 by Admin
CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 2 Exam Online 2019
CCNA CyberOps 1.1 -- Chapter 2 Exam
Quiz-summary
0 of 27 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
Information
CCNA CyberOps 1.1 -- Chapter 2 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 27 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- Answered
- Review
-
Question 1 of 27
1. Question
2 pointsWhat are two advantages of the NTFS file system compared with FAT32? (Choose two.)Correct
Incorrect
The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent.
Hint
The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent. -
Question 2 of 27
2. Question
1 pointsWhere are the settings that are chosen during the installation process stored?Correct
Incorrect
The Registry contains all settings chosen from Control Panels, file associations, system policies, applications installed, and application license keys.
Hint
The Registry contains all settings chosen from Control Panels, file associations, system policies, applications installed, and application license keys. -
Question 3 of 27
3. Question
1 pointsWhat technology was created to replace the BIOS program on modern personal computer motherboards?Correct
Incorrect
As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.
Hint
As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program. -
Question 4 of 27
4. Question
1 pointsWhat term is used to describe a logical drive that can be formatted to store data?Correct
Incorrect
Hard disk drives are organized by several physical and logical structures. Partitions are logical portions of the disk that can be formatted to store data. Partitions consist of tracks, sectors, and clusters. Tracks are concentric rings on the disk surface. Tracks are divided into sectors and multiple sectors are combined logically to form clusters
Hint
Hard disk drives are organized by several physical and logical structures. Partitions are logical portions of the disk that can be formatted to store data. Partitions consist of tracks, sectors, and clusters. Tracks are concentric rings on the disk surface. Tracks are divided into sectors and multiple sectors are combined logically to form clusters -
Question 5 of 27
5. Question
2 pointsWhich two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)Correct
Incorrect
The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result. Nslookup is a tool for testing and troubleshooting DNS servers.
Hint
The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result. Nslookup is a tool for testing and troubleshooting DNS servers. -
Question 6 of 27
6. Question
1 pointsA technician is troubleshooting a PC unable to connect to the network. What command should be issued to check the IP address of the device?Correct
Incorrect
The commands tracert and ping are used to test the connectivity of the PC to the network. The command nslookup initiates a query to an Internet domain name server.
Hint
The commands tracert and ping are used to test the connectivity of the PC to the network. The command nslookup initiates a query to an Internet domain name server. -
Question 7 of 27
7. Question
1 pointsWhat utility is available on a Windows PC to view current running applications and processes?Correct
Incorrect
On a Windows PC the Task Manager utility can be used to view the applications, processes, and services that are currently running.
Hint
On a Windows PC the Task Manager utility can be used to view the applications, processes, and services that are currently running. -
Question 8 of 27
8. Question
1 pointsA technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?Correct
Incorrect
Traceroute (tracert) is a utility that generates a list of hops that were successfully reached along the path from source to destination.This list can provide important verification and troubleshooting information. The ipconfig utility is used to display the IP configuration settings on a Windows PC. The Netstat utility is used to identify which active TCP connections are open and running on a networked host. Nslookup is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.
Hint
Traceroute (tracert) is a utility that generates a list of hops that were successfully reached along the path from source to destination.This list can provide important verification and troubleshooting information. The ipconfig utility is used to display the IP configuration settings on a Windows PC. The Netstat utility is used to identify which active TCP connections are open and running on a networked host. Nslookup is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers. -
Question 9 of 27
9. Question
2 pointsWhich two things can be determined by using the ping command? (Choose two.)Correct
Incorrect
A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.
Hint
A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network. -
Question 10 of 27
10. Question
1 pointsA user logs in to Windows with a regular user account and attempts to use an application that requires administrative privileges. What can the user do to successfully use the application?Correct
Incorrect
As a security best practice, it is advisable not to log on to Windows using the Administrator account or an account with administrative privileges. When it is necessary to run or install software that requires the privileges of the Administrator, the user can right-click the software in the Windows File Explorer and choose Run as Administrator.
Hint
As a security best practice, it is advisable not to log on to Windows using the Administrator account or an account with administrative privileges. When it is necessary to run or install software that requires the privileges of the Administrator, the user can right-click the software in the Windows File Explorer and choose Run as Administrator. -
Question 11 of 27
11. Question
2 pointsWhich two user accounts are automatically created when a user installs Windows to a new computer? (Choose two.)Correct
Incorrect
When a user installs Windows, two local user accounts are created automatically during the process, administrator and guest.
Hint
When a user installs Windows, two local user accounts are created automatically during the process, administrator and guest. -
Question 12 of 27
12. Question
1 pointsWhich type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed?Correct
Incorrect
The types of commands that PowerShell can execute include the following:cmdlets – perform an action and return an output or object to the next command that will be executed PowerShell scripts – files with a .ps1 extension that contain PowerShell commands that are executed PowerShell functions - pieces of code that can be referenced in a script
Hint
The types of commands that PowerShell can execute include the following:cmdlets – perform an action and return an output or object to the next command that will be executed PowerShell scripts – files with a .ps1 extension that contain PowerShell commands that are executed PowerShell functions - pieces of code that can be referenced in a script -
Question 13 of 27
13. Question
1 pointsWhat is the purpose of using the net accounts command in Windows?Correct
Incorrect
These are some common net commands: net accounts – sets password and logon requirements for users net start – starts a network service or lists running network services net use – connects, disconnects, and displays information about shared network resources net view – shows a list of computers and network devices on the network When used without options, the net accounts command displays the current settings for password, logon limitations, and domain information.
Hint
These are some common net commands: net accounts – sets password and logon requirements for users net start – starts a network service or lists running network services net use – connects, disconnects, and displays information about shared network resources net view – shows a list of computers and network devices on the network When used without options, the net accounts command displays the current settings for password, logon limitations, and domain information. -
Question 14 of 27
14. Question
1 pointsWhat is the purpose of entering the netsh command on a Windows PC?Correct
Incorrect
The netsh.exe tool can be used to configure networking parameters for the PC from a command prompt.
Hint
The netsh.exe tool can be used to configure networking parameters for the PC from a command prompt. -
Question 15 of 27
15. Question
2 pointsWhat are two reasons for entering the ping 127.0.0.1 command on a Windows PC? (Choose two.)Correct
Incorrect
The IP address 127.0.0.1 is a loopback address on the PC. A successful ping to the loopback address indicates that the TCP/IP protocol suite is installed properly and the NIC is working as expected. A ping to the loopback address does not test the connectivity to remote networks, nor will it display bandwidth and throughput information.
Hint
The IP address 127.0.0.1 is a loopback address on the PC. A successful ping to the loopback address indicates that the TCP/IP protocol suite is installed properly and the NIC is working as expected. A ping to the loopback address does not test the connectivity to remote networks, nor will it display bandwidth and throughput information. -
Question 16 of 27
16. Question
2 pointsWhat are two reasons for entering the ipconfig command on a Windows PC? (Choose two.)Correct
Incorrect
The command ipconfig is a useful tool for troubleshooting. The command will display some IP addressing configuration and the network media connection status. The command does not test the connection to the DNS server configured or test remote networks. It does not display bandwidth and throughput information.
Hint
The command ipconfig is a useful tool for troubleshooting. The command will display some IP addressing configuration and the network media connection status. The command does not test the connection to the DNS server configured or test remote networks. It does not display bandwidth and throughput information. -
Question 17 of 27
17. Question
1 pointsRefer to the exhibit. A cyber security administrator is attempting to view system information from the Windows PowerShell and recieves the error message shown. What action does the administrator need to take to successfully run the command?Correct
Incorrect
Best practices advise not to log into systems with an administrator account, but rather a user account. When logged in as a user it is possible to run Windows utilitites, such as PowerShell and the Command Prompt as an administrator by right clicking on the utility and slecting Run as Administrator.
Hint
Best practices advise not to log into systems with an administrator account, but rather a user account. When logged in as a user it is possible to run Windows utilitites, such as PowerShell and the Command Prompt as an administrator by right clicking on the utility and slecting Run as Administrator. -
Question 18 of 27
18. Question
1 pointsRefer to the exhibit. Which Microsoft Windows application is being used?Correct
Incorrect
Windows Performance Monitor is used to evaluate the performance of individual components on a Windows host computer. Commonly monitored components include the processor, hard drive, network, and memory. Windows Task Manager and Performance Monitor are used when malware is suspected and a component is not performing the way it should.
Hint
Windows Performance Monitor is used to evaluate the performance of individual components on a Windows host computer. Commonly monitored components include the processor, hard drive, network, and memory. Windows Task Manager and Performance Monitor are used when malware is suspected and a component is not performing the way it should. -
Question 19 of 27
19. Question
1 pointsRefer to the exhibit. A cybersecurity analyst is investigating a reported security incident on a Microsoft Windows computer. Which tool is the analyst using?Correct
Incorrect
Event Viewer is used to investigate the history of application, security, and system events. Events show the date and time that the event occurred along with the source of the event. If a cybersecurity analyst has the address of the Windows computer targeted and/or the date and time that a security breach occurred, the analyst could use Event Viewer to document and prove what occurred on the computer.
Hint
Event Viewer is used to investigate the history of application, security, and system events. Events show the date and time that the event occurred along with the source of the event. If a cybersecurity analyst has the address of the Windows computer targeted and/or the date and time that a security breach occurred, the analyst could use Event Viewer to document and prove what occurred on the computer. -
Question 20 of 27
20. Question
1 pointsConsider the path representation in Windows CLI C:\Users\Jason\Desktop\mydocu.txt. What does the Users\Jason component represent?Correct
Incorrect
In the path representation in Windows CLI, the components of C:\Users\Jason\Desktop\mydocu.txt are as follows:C:\ represents the root directory of the storage device. Users\Jason represents the file directory. Desktop represents the current file directory. The mydocu.txt represents the user file.
Hint
In the path representation in Windows CLI, the components of C:\Users\Jason\Desktop\mydocu.txt are as follows:C:\ represents the root directory of the storage device. Users\Jason represents the file directory. Desktop represents the current file directory. The mydocu.txt represents the user file. -
Question 21 of 27
21. Question
1 pointsFor security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?Correct
Incorrect
Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types.
Hint
Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types. -
Question 22 of 27
22. Question
1 pointsWhat would be displayed if the netstat -abno command was entered on a Windows PC?Correct
Incorrect
With the optional switch -abno, the netstat command will display all network connections together with associated running processes. It helps a user identify possible malware connections.
Hint
With the optional switch -abno, the netstat command will display all network connections together with associated running processes. It helps a user identify possible malware connections. -
Question 23 of 27
23. Question
1 pointsWhat function is provided by the Windows Task Manager?Correct
Incorrect
Windows Task Manager enables an end user to monitor applications, processes, and services currently running on the end device. It can be used to start or stop programs, stop processes, and display informative statistics about the device.
Hint
Windows Task Manager enables an end user to monitor applications, processes, and services currently running on the end device. It can be used to start or stop programs, stop processes, and display informative statistics about the device. -
Question 24 of 27
24. Question
4 pointsMatch the Windows command to the description.
Sort elements
- ren
- mkdir
- cd
- dir
-
renames a file
-
creates a new directory
-
changes the current directory
-
lists files in a directory
Correct
Incorrect
-
Question 25 of 27
25. Question
3 pointsMatch the definition to the Microsoft Windows term. (Not all options are used.)
Sort elements
- process
- service
- thread
- registry
-
a currently executing program
-
runs in the background to support the operating system and applications
-
instructions executed by the processor
Correct
Incorrect
-
Question 26 of 27
26. Question
5 pointsMatch the Windows term to the description.
Sort elements
- MACE
- FAT32
- NTFS
- EFI
- alternate data streams
-
NTFS-generated timestamps for file activity
-
a legacy file system
-
most common file system
-
upgraded firmware that stores boot code in the firmware
-
a method of adding information to an NTFS-based file
Correct
Incorrect
-
Question 27 of 27
27. Question
3 pointsMatch the definition to the Microsoft Windows term. (Not all options are used.)
Sort elements
- handle
- registry
- WMI
- thread
-
provides access needed by the user space process
-
database of hardware, software, users, and settings
-
used to manage remote computers
Correct
Incorrect