You must be logged in to view this content.
Quiz Summary
0 of 3 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 3 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- Current
- Review
- Answered
- Correct
- Incorrect
- Question 1 of 3
1. Question
1 point(s)A server in your network’s DMZ was recently attacked. The firewall logs show that the server was attacked from an external IP address with the following socket: 72.52.206.134:5678. You need to check the server to see if it still has an active connection. Which of the following tools should you use?
CorrectIncorrect - Question 2 of 3
2. Question
1 point(s)You suspect that a computer in your network is connecting to a remote computer without any user interaction. You want to verify this and identify the remote computer. Additionally, you want to identify how this connection is being initiated.
Which of the following will BEST meet this need?
CorrectIncorrect - Question 3 of 3
3. Question
1 point(s)Your organization hosts an ecommerce website. Lisa analyzed the computer utilization of this website and noted that usage spikes at different times of the year. She wants to implement a cost-effective solution to handle the variable capacity demand. Which of the following strategies is she pursuing?
CorrectIncorrect