0 of 3 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 3 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
|Table is loading|
|No data available|
- Question 1 of 3
1. Question1 point(s)
A server in your network’s DMZ was recently attacked. The firewall logs show that the server was attacked from an external IP address with the following socket: 126.96.36.199:5678. You need to check the server to see if it still has an active connection. Which of the following tools should you use?CorrectIncorrect
- Question 2 of 3
2. Question1 point(s)
You suspect that a computer in your network is connecting to a remote computer without any user interaction. You want to verify this and identify the remote computer. Additionally, you want to identify how this connection is being initiated.
Which of the following will BEST meet this need?CorrectIncorrect
- Question 3 of 3
3. Question1 point(s)
Your organization hosts an ecommerce website. Lisa analyzed the computer utilization of this website and noted that usage spikes at different times of the year. She wants to implement a cost-effective solution to handle the variable capacity demand. Which of the following strategies is she pursuing?CorrectIncorrect