Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA CyberOps Chapter 2 Exam Online

Last Updated on May 20, 2021 by Admin

CCNA CyberOps Chapter 2 Exam Online

CCNA CyberOps 1.1 -- Chapter 2 Exam

Time limit: 0

Quiz-summary

0 of 27 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27

Information

CCNA CyberOps 1.1 — Chapter 2 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 27 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  1. Answered
  2. Review
  1. Question 1 of 27
    1. Question
    2 points

    What are two advantages of the NTFS file system compared with FAT32? (Choose two.)

    Correct

    Incorrect

    The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent.

    Hint

    The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent.

  2. Question 2 of 27
    2. Question
    1 points

    Where are the settings that are chosen during the installation process stored?

    Correct

    Incorrect

    The Registry contains all settings chosen from Control Panels, file associations, system policies, applications installed, and application license keys.

    Hint

    The Registry contains all settings chosen from Control Panels, file associations, system policies, applications installed, and application license keys.

  3. Question 3 of 27
    3. Question
    1 points

    What technology was created to replace the BIOS program on modern personal computer motherboards?

    Correct

    Incorrect

    As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.

    Hint

    As of 2015, most personal computer motherboards are shipped with UEFI as the replacement for the BIOS program.

  4. Question 4 of 27
    4. Question
    1 points

    What term is used to describe a logical drive that can be formatted to store data?

    Correct

    Incorrect

    Hard disk drives are organized by several physical and logical structures. Partitions are logical portions of the disk that can be formatted to store data. Partitions consist of tracks, sectors, and clusters. Tracks are concentric rings on the disk surface. Tracks are divided into sectors and multiple sectors are combined logically to form clusters

    Hint

    Hard disk drives are organized by several physical and logical structures. Partitions are logical portions of the disk that can be formatted to store data. Partitions consist of tracks, sectors, and clusters. Tracks are concentric rings on the disk surface. Tracks are divided into sectors and multiple sectors are combined logically to form clusters

  5. Question 5 of 27
    5. Question
    2 points

    Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

    Correct

    Incorrect

    The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result.

    Nslookup is a tool for testing and troubleshooting DNS servers.

    Hint

    The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result.

    Nslookup is a tool for testing and troubleshooting DNS servers.

  6. Question 6 of 27
    6. Question
    1 points

    A technician is troubleshooting a PC unable to connect to the network. What command should be issued to check the IP address of the device?

    Correct

    Incorrect

    The commands tracert and ping are used to test the connectivity of the PC to the network. The command nslookup initiates a query to an Internet domain name server.

    Hint

    The commands tracert and ping are used to test the connectivity of the PC to the network. The command nslookup initiates a query to an Internet domain name server.

  7. Question 7 of 27
    7. Question
    1 points

    What utility is available on a Windows PC to view current running applications and processes?

    Correct

    Incorrect

    On a Windows PC the Task Manager utility can be used to view the applications, processes, and services that are currently running.

    Hint

    On a Windows PC the Task Manager utility can be used to view the applications, processes, and services that are currently running.

  8. Question 8 of 27
    8. Question
    1 points

    A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

    Correct

    Incorrect

    Traceroute (tracert) is a utility that generates a list of hops that were successfully reached along the path from source to destination.This list can provide important verification and troubleshooting information. The ipconfig utility is used to display the IP configuration settings on a Windows PC. The Netstat utility is used to identify which active TCP connections are open and running on a networked host. Nslookup is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.

    Hint

    Traceroute (tracert) is a utility that generates a list of hops that were successfully reached along the path from source to destination.This list can provide important verification and troubleshooting information. The ipconfig utility is used to display the IP configuration settings on a Windows PC. The Netstat utility is used to identify which active TCP connections are open and running on a networked host. Nslookup is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.

  9. Question 9 of 27
    9. Question
    2 points

    Which two things can be determined by using the ping command? (Choose two.)

    Correct

    Incorrect

    A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.

    Hint

    A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.

  10. Question 10 of 27
    10. Question
    1 points

    A user logs in to Windows with a regular user account and attempts to use an application that requires administrative privileges. What can the user do to successfully use the application?

    Correct

    Incorrect

    As a security best practice, it is advisable not to log on to Windows using the Administrator account or an account with administrative privileges. When it is necessary to run or install software that requires the privileges of the Administrator, the user can right-click the software in the Windows File Explorer and choose Run as Administrator.

    Hint

    As a security best practice, it is advisable not to log on to Windows using the Administrator account or an account with administrative privileges. When it is necessary to run or install software that requires the privileges of the Administrator, the user can right-click the software in the Windows File Explorer and choose Run as Administrator.

  11. Question 11 of 27
    11. Question
    2 points

    Which two user accounts are automatically created when a user installs Windows to a new computer? (Choose two.)

    Correct

    Incorrect

    When a user installs Windows, two local user accounts are created automatically during the process, administrator and guest.

    Hint

    When a user installs Windows, two local user accounts are created automatically during the process, administrator and guest.

  12. Question 12 of 27
    12. Question
    1 points

    Which type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed?

    Correct

    Incorrect

    The types of commands that PowerShell can execute include the following:cmdlets – perform an action and return an output or object to the next command that will be executed
    PowerShell scripts – files with a .ps1 extension that contain PowerShell commands that are executed
    PowerShell functions – pieces of code that can be referenced in a script

    Hint

    The types of commands that PowerShell can execute include the following:cmdlets – perform an action and return an output or object to the next command that will be executed
    PowerShell scripts – files with a .ps1 extension that contain PowerShell commands that are executed
    PowerShell functions – pieces of code that can be referenced in a script

  13. Question 13 of 27
    13. Question
    1 points

    What is the purpose of using the net accounts command in Windows?

    Correct

    Incorrect

    These are some common net commands:
    net accounts – sets password and logon requirements for users
    net start – starts a network service or lists running network services
    net use – connects, disconnects, and displays information about shared network resources
    net view – shows a list of computers and network devices on the network
    When used without options, the net accounts command displays the current settings for password, logon limitations, and domain information.

    Hint

    These are some common net commands:
    net accounts – sets password and logon requirements for users
    net start – starts a network service or lists running network services
    net use – connects, disconnects, and displays information about shared network resources
    net view – shows a list of computers and network devices on the network
    When used without options, the net accounts command displays the current settings for password, logon limitations, and domain information.

  14. Question 14 of 27
    14. Question
    1 points

    What is the purpose of entering the netsh command on a Windows PC?

    Correct

    Incorrect

    The netsh.exe tool can be used to configure networking parameters for the PC from a command prompt.

    Hint

    The netsh.exe tool can be used to configure networking parameters for the PC from a command prompt.

  15. Question 15 of 27
    15. Question
    2 points

    What are two reasons for entering the ping 127.0.0.1 command on a Windows PC? (Choose two.)

    Correct

    Incorrect

    The IP address 127.0.0.1 is a loopback address on the PC. A successful ping to the loopback address indicates that the TCP/IP protocol suite is installed properly and the NIC is working as expected. A ping to the loopback address does not test the connectivity to remote networks, nor will it display bandwidth and throughput information.

    Hint

    The IP address 127.0.0.1 is a loopback address on the PC. A successful ping to the loopback address indicates that the TCP/IP protocol suite is installed properly and the NIC is working as expected. A ping to the loopback address does not test the connectivity to remote networks, nor will it display bandwidth and throughput information.

  16. Question 16 of 27
    16. Question
    2 points

    What are two reasons for entering the ipconfig command on a Windows PC? (Choose two.)

    Correct

    Incorrect

    The command ipconfig is a useful tool for troubleshooting. The command will display some IP addressing configuration and the network media connection status. The command does not test the connection to the DNS server configured or test remote networks. It does not display bandwidth and throughput information.

    Hint

    The command ipconfig is a useful tool for troubleshooting. The command will display some IP addressing configuration and the network media connection status. The command does not test the connection to the DNS server configured or test remote networks. It does not display bandwidth and throughput information.

  17. Question 17 of 27
    17. Question
    1 points

    Refer to the exhibit. A cyber security administrator is attempting to view system information from the Windows PowerShell and recieves the error message shown. What action does the administrator need to take to successfully run the command?

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 2 Exam Answers 2019 Full 100% 03
    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 2 Exam Answers 2019 Full 100% 03

    Correct

    Incorrect

    Best practices advise not to log into systems with an administrator account, but rather a user account. When logged in as a user it is possible to run Windows utilitites, such as PowerShell and the Command Prompt as an administrator by right clicking on the utility and slecting Run as Administrator.

    Hint

    Best practices advise not to log into systems with an administrator account, but rather a user account. When logged in as a user it is possible to run Windows utilitites, such as PowerShell and the Command Prompt as an administrator by right clicking on the utility and slecting Run as Administrator.

  18. Question 18 of 27
    18. Question
    1 points

    Refer to the exhibit. Which Microsoft Windows application is being used?

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 2 Exam Answers 2019 Full 100% 02
    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 2 Exam Answers 2019 Full 100% 02

    Correct

    Incorrect

    Windows Performance Monitor is used to evaluate the performance of individual components on a Windows host computer. Commonly monitored components include the processor, hard drive, network, and memory. Windows Task Manager and Performance Monitor are used when malware is suspected and a component is not performing the way it should.

    Hint

    Windows Performance Monitor is used to evaluate the performance of individual components on a Windows host computer. Commonly monitored components include the processor, hard drive, network, and memory. Windows Task Manager and Performance Monitor are used when malware is suspected and a component is not performing the way it should.

  19. Question 19 of 27
    19. Question
    1 points

    Refer to the exhibit. A cybersecurity analyst is investigating a reported security incident on a Microsoft Windows computer. Which tool is the analyst using?

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 2 Exam Answers 2019 Full 100% 01
    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 2 Exam Answers 2019 Full 100% 01

    Correct

    Incorrect

    Event Viewer is used to investigate the history of application, security, and system events. Events show the date and time that the event occurred along with the source of the event. If a cybersecurity analyst has the address of the Windows computer targeted and/or the date and time that a security breach occurred, the analyst could use Event Viewer to document and prove what occurred on the computer.

    Hint

    Event Viewer is used to investigate the history of application, security, and system events. Events show the date and time that the event occurred along with the source of the event. If a cybersecurity analyst has the address of the Windows computer targeted and/or the date and time that a security breach occurred, the analyst could use Event Viewer to document and prove what occurred on the computer.

  20. Question 20 of 27
    20. Question
    1 points

    Consider the path representation in Windows CLI C:\Users\Jason\Desktop\mydocu.txt. What does the Users\Jason component represent?

    Correct

    Incorrect

    In the path representation in Windows CLI, the components of C:\Users\Jason\Desktop\mydocu.txt are as follows:C:\ represents the root directory of the storage device.
    Users\Jason represents the file directory.
    Desktop represents the current file directory.
    The mydocu.txt represents the user file.

    Hint

    In the path representation in Windows CLI, the components of C:\Users\Jason\Desktop\mydocu.txt are as follows:C:\ represents the root directory of the storage device.
    Users\Jason represents the file directory.
    Desktop represents the current file directory.
    The mydocu.txt represents the user file.

  21. Question 21 of 27
    21. Question
    1 points

    For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

    Correct

    Incorrect

    Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types.

    Hint

    Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types.

  22. Question 22 of 27
    22. Question
    1 points

    What would be displayed if the netstat -abno command was entered on a Windows PC?

    Correct

    Incorrect

    With the optional switch -abno, the netstat command will display all network connections together with associated running processes. It helps a user identify possible malware connections.

    Hint

    With the optional switch -abno, the netstat command will display all network connections together with associated running processes. It helps a user identify possible malware connections.

  23. Question 23 of 27
    23. Question
    1 points

    What function is provided by the Windows Task Manager?

    Correct

    Incorrect

    Windows Task Manager enables an end user to monitor applications, processes, and services currently running on the end device. It can be used to start or stop programs, stop processes, and display informative statistics about the device.

    Hint

    Windows Task Manager enables an end user to monitor applications, processes, and services currently running on the end device. It can be used to start or stop programs, stop processes, and display informative statistics about the device.

  24. Question 24 of 27
    24. Question
    4 points

    Match the Windows command to the description.

    Sort elements
    • ren
    • mkdir
    • cd
    • dir
    • renames a file
      • creates a new directory
        • changes the current directory
          • lists files in a directory
            Correct

            Incorrect

          • Question 25 of 27
            25. Question
            3 points

            Match the definition to the Microsoft Windows term. (Not all options are used.)

             

            Sort elements
            • process
            • service
            • thread
            • registry
            • a currently executing program
              • runs in the background to support the operating system and applications
                • instructions executed by the processor
                  Correct

                  Incorrect

                • Question 26 of 27
                  26. Question
                  5 points

                  Match the Windows term to the description.

                   

                  Sort elements
                  • MACE
                  • FAT32
                  • NTFS
                  • EFI
                  • alternate data streams
                  • NTFS-generated timestamps for file activity
                    • a legacy file system
                      • most common file system
                        • upgraded firmware that stores boot code in the firmware
                          • a method of adding information to an NTFS-based file
                            Correct

                            Incorrect

                          • Question 27 of 27
                            27. Question
                            3 points

                            Match the definition to the Microsoft Windows term. (Not all options are used.)

                             

                            Sort elements
                            • handle
                            • registry
                            • WMI
                            • thread
                            • provides access needed by the user space process
                              • database of hardware, software, users, and settings
                                • used to manage remote computers
                                  Correct

                                  Incorrect

                                • CCNA1 v7
                                • CCNA2 v7
                                • CCNA3 v7
                                System Test Exam Answers
                                Modules 1 – 3 Exam Answers
                                Modules 4 – 7 Exam Answers
                                Modules 8 – 10 Exam Answers
                                Modules 11 – 13 Exam Answers
                                Modules 14 – 15 Exam Answers
                                Modules 16 – 17 Exam Answers
                                Practice Final – ITN Answers
                                Course Feedback
                                ITN Practice PT Skills Assessment (PTSA)
                                Final Exam Answers
                                Modules 1 – 4 Exam Answers
                                Modules 5 – 6 Exam Answers
                                Modules 7 – 9 Exam Answers
                                Modules 10 – 13 Exam Answers
                                Modules 14 – 16 Exam Answers
                                ITN Practice Skills Assessment – PT Answers
                                SRWE Practice Skills Assessment – PT Part 1 Answers
                                SRWE Practice Skills Assessment – PT Part 2 Answers
                                SRWE Hands On Skills Exam Answers
                                SRWE Practice Final Exam Answers
                                SRWE Final Exam Answers 
                                Modules 1 – 2 Exam Answers
                                Modules 3 – 5 Exam Answers
                                Modules 6 – 8 Exam Answers
                                Modules 9 – 12 Exam Answers
                                Modules 13 – 14 Exam Answers
                                ITN Practice PT Skills Assessment (PTSA) Answers
                                SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                                SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                                ENSA Practice PT Skills Assessment (PTSA) Answers
                                ENSA Hands On Skills Exam Answers
                                Practice Final – ENSA Answers
                                ENSA Final Exam Answers
                                CCNA Certification Practice Exam Answers

                                Copyright © 2023 PressExam.