Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA CyberOps Chapter 3 Exam Online

Last Updated on May 20, 2021 by Admin

CCNA CyberOps Chapter 3 Exam Online

CCNA CyberOps 1.1 -- Chapter 3 Exam

Time limit: 0

Quiz-summary

0 of 25 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25

Information

CCNA CyberOps 1.1 — Chapter 3 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 25 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  1. Answered
  2. Review
  1. Question 1 of 25
    1. Question
    1 points

    Why would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)?

    Correct

    Incorrect

    There are several reasons why Linux is a good choice for the SOC.Linux is open source.
    The command line interface is a very powerful environment.
    The user has more control over the operating system.
    Linux allows for better network communication control.

    Hint

    There are several reasons why Linux is a good choice for the SOC.Linux is open source.
    The command line interface is a very powerful environment.
    The user has more control over the operating system.
    Linux allows for better network communication control.

  2. Question 2 of 25
    2. Question
    1 points

    Which type of tool allows administrators to observe and understand every detail of a network transaction?

    Correct

    Incorrect

    Network packet capture software is an important tool because it makes it possible to observe and understand the details of a network transaction.

    Hint

    Network packet capture software is an important tool because it makes it possible to observe and understand the details of a network transaction.

  3. Question 3 of 25
    3. Question
    1 points

    A Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment?

    Correct

    Incorrect

    A terminal emulator is an application program a user of Linux can use in order to access the CLI environment.

    Hint

    A terminal emulator is an application program a user of Linux can use in order to access the CLI environment.

  4. Question 4 of 25
    4. Question
    1 points

    Which Linux command can be used to display the name of the current working directory?

    Correct

    Incorrect

    One of the most important commands in Linux is the pwd command, which stands for print working directory. It shows users the physical path for the directory they are working in.

    Hint

    One of the most important commands in Linux is the pwd command, which stands for print working directory. It shows users the physical path for the directory they are working in.

  5. Question 5 of 25
    5. Question
    1 points

    How is a server different from a workstation computer?

    Correct

    Incorrect

    Servers provide services such as file management, email, web pages, log management, financial transactions, databases, and more.

    Hint

    Servers provide services such as file management, email, web pages, log management, financial transactions, databases, and more.

  6. Question 6 of 25
    6. Question
    1 points

    Refer to the exhibit. Which well-known port number is used by the server?

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 3 Exam Answers 2019 Full 100% 01
    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 3 Exam Answers 2019 Full 100% 01

    Correct

    Incorrect

    SSH is a protocol that is used to securely access a remote network device. The well-known port number used by SSH is 22.

    Hint

    SSH is a protocol that is used to securely access a remote network device. The well-known port number used by SSH is 22.

  7. Question 7 of 25
    7. Question
    1 points

    What is the well-known port address number used by DNS to serve requests?

    Correct

    Incorrect

    Port numbers are used in TCP and UDP communications to differentiate between the various services running on a device. The well-known port number used by DNS is port 53.

    Hint

    Port numbers are used in TCP and UDP communications to differentiate between the various services running on a device. The well-known port number used by DNS is port 53.

  8. Question 8 of 25
    8. Question
    2 points

    Which two methods can be used to harden a computing device? (Choose two.)

    Correct

    Incorrect

    The basic best practices for device hardening are as follows:
    Ensure physical security.
    Minimize installed packages.
    Disable unused services.
    Use SSH and disable the root account login over SSH.
    Keep the system updated.
    Disable USB auto-detection.
    Enforce strong passwords.
    Force periodic password changes.
    Keep users from reusing old passwords.
    Review logs regularly.

    Hint

    The basic best practices for device hardening are as follows:
    Ensure physical security.
    Minimize installed packages.
    Disable unused services.
    Use SSH and disable the root account login over SSH.
    Keep the system updated.
    Disable USB auto-detection.
    Enforce strong passwords.
    Force periodic password changes.
    Keep users from reusing old passwords.
    Review logs regularly.

  9. Question 9 of 25
    9. Question
    1 points

    Which command can be utilized to view log entries of NGINX system events in real time?

    Correct

    Incorrect

    The journalctl command supports mixing options to achieve a desired filter set. The –u option allows filtering on the desired unit, whereas the –f option follows the specific log, thus monitoring the event in real time.

    Hint

    The journalctl command supports mixing options to achieve a desired filter set. The –u option allows filtering on the desired unit, whereas the –f option follows the specific log, thus monitoring the event in real time.

  10. Question 10 of 25
    10. Question
    1 points

    Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?

    ls –l analyst.txt
    -rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt

    Correct

    Incorrect

    The file permissions are always displayed in the User, Group and Other order. In the example displayed, the file has the following permissions:
    The dash (-) means that this is a file. For directories, the first dash would replaced with a “d”.
    The first set of characters is for user permission (rwx). The user, sales, who owns the file can read, write and execute the file.
    The second set of characters is for group permissions (rw-). The group, staff, who owns the file can read and write to the file.
    The third set of characters is for any other user or group permissions (r–). Any other user or group on the computer can only read the file.

    Hint

    The file permissions are always displayed in the User, Group and Other order. In the example displayed, the file has the following permissions:
    The dash (-) means that this is a file. For directories, the first dash would replaced with a “d”.
    The first set of characters is for user permission (rwx). The user, sales, who owns the file can read, write and execute the file.
    The second set of characters is for group permissions (rw-). The group, staff, who owns the file can read and write to the file.
    The third set of characters is for any other user or group permissions (r–). Any other user or group on the computer can only read the file.

  11. Question 11 of 25
    11. Question
    1 points

    Which user can override file permissions on a Linux computer?

    Correct

    Incorrect

    A user has as much rights to a file as the file permissions allow. The only user that can override file permission on a Linux computer is the root user. Because the root user has the power to override file permissions, the root user can write to any file.

    Hint

    A user has as much rights to a file as the file permissions allow. The only user that can override file permission on a Linux computer is the root user. Because the root user has the power to override file permissions, the root user can write to any file.

  12. Question 12 of 25
    12. Question
    1 points

    Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss?

    Correct

    Incorrect

    The ext3 file system is considered a journaled file system that was designed to improve the existing ext2 file system. A journal, the main feature added to ext3, is a technique used to minimize the risk of file system corruption in the event of sudden power loss.

    Hint

    The ext3 file system is considered a journaled file system that was designed to improve the existing ext2 file system. A journal, the main feature added to ext3, is a technique used to minimize the risk of file system corruption in the event of sudden power loss.

  13. Question 13 of 25
    13. Question
    1 points

    Which file system is the primary file system used by Apple in current Macintosh computers?

    Correct

    Incorrect

    The primary file system used by Apple in its lates Macintosh computers is APFS.

    Hint

    The primary file system used by Apple in its lates Macintosh computers is APFS.

  14. Question 14 of 25
    14. Question
    1 points

    What is the main purpose of the X Window System?

    Correct

    Incorrect

    The X Window System provides the basic framework for a GUI, but the GUI itself varies greatly between different distributions.

    Hint

    The X Window System provides the basic framework for a GUI, but the GUI itself varies greatly between different distributions.

  15. Question 15 of 25
    15. Question
    1 points

    What is a purpose of apt-get commands?

    Correct

    Incorrect

    The Advanced Packaging Tool (apt) package manager is used to update the operating system. The apt-get update command is used to search and obtain the package list from a repository and update the local package database.

    Hint

    The Advanced Packaging Tool (apt) package manager is used to update the operating system. The apt-get update command is used to search and obtain the package list from a repository and update the local package database.

  16. Question 16 of 25
    16. Question
    1 points

    Which Linux command is used to manage processes?

    Correct

    Incorrect

    The kill command is used to stop, restart, or pause a process. The chrootkit command is used to check the computer for rootkits, a set of software tools that can increase the privilege level of a user or grant access to portions of software normally not allowed. The grep command is used to look for a file or text within a file. The ls command is used to list files, directories, and file information.

    Hint

    The kill command is used to stop, restart, or pause a process. The chrootkit command is used to check the computer for rootkits, a set of software tools that can increase the privilege level of a user or grant access to portions of software normally not allowed. The grep command is used to look for a file or text within a file. The ls command is used to list files, directories, and file information.

  17. Question 17 of 25
    17. Question
    2 points

    Which two Linux commands might be used before using the kill command? (Choose two.)

    Correct

    Incorrect

    The ps or top command might be used before using the kill command to discover the process ID (PID) for the specific process.

    Hint

    The ps or top command might be used before using the kill command to discover the process ID (PID) for the specific process.

  18. Question 18 of 25
    18. Question
    1 points

    What is the purpose of a Linux package manager?

    Correct

    Incorrect

    A package is a specific program and all of the files needed to run that application. A package manager is used to install a package and place all the associated files in the correct location within the operating system.

    Hint

    A package is a specific program and all of the files needed to run that application. A package manager is used to install a package and place all the associated files in the correct location within the operating system.

  19. Question 19 of 25
    19. Question
    1 points

    What term is used for operating system updates?

    Correct

    Incorrect

    Operating system updates, also known as patches, are provided by companies that create the operating system. A user can check for operating system updates at any time. In a Linux GUI environment, the Dash Search Box can be used to search for the Software Updater icon.

    Hint

    Operating system updates, also known as patches, are provided by companies that create the operating system. A user can check for operating system updates at any time. In a Linux GUI environment, the Dash Search Box can be used to search for the Software Updater icon.

  20. Question 20 of 25
    20. Question
    1 points

    Why is Linux considered to be better protected against malware than other operating systems?

    Correct

    Incorrect

    The Linux operating design including how the file system is structured, standard file permissions, and user account restrictions make Linux a better protected operating system. However, Linux still has vulnerabilities and can have malware installed that affects the operating system.

    Hint

    The Linux operating design including how the file system is structured, standard file permissions, and user account restrictions make Linux a better protected operating system. However, Linux still has vulnerabilities and can have malware installed that affects the operating system.

  21. Question 21 of 25
    21. Question
    1 points

    What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?

    Correct

    Incorrect

    A rootkit is used by an attacker to secure a backdoor to a compromised computer, grant access to portions of the operating system normally not permitted, or increase the privileges of a user.

    Hint

    A rootkit is used by an attacker to secure a backdoor to a compromised computer, grant access to portions of the operating system normally not permitted, or increase the privileges of a user.

  22. Question 22 of 25
    22. Question
    1 points

    What is the method employed by a Linux kernel to create new processes for multitasking of a process?

    Correct

    Incorrect

    Multitasking operating systems are required to execute several processes at the same time. Forking is a method that the kernel uses to allow a process to create a copy of itself.

    Hint

    Multitasking operating systems are required to execute several processes at the same time. Forking is a method that the kernel uses to allow a process to create a copy of itself.

  23. Question 23 of 25
    23. Question
    4 points

    Match typical Linux log files to the function.

     

    Sort elements
    • /var/log/secure
    • /var/log/messages
    • /var/log/dmesg
    • /var/log/auth.log
    • used by RedHat and CentOS computers and tracks authentication-related events
      • contains generic computer activity logs, and is used to store informational and noncritical system messages
        • stores information related to hardware devices and their drivers
          • used by Debian and Ubuntu computers and stores all authentication-related events
            Correct

            Incorrect

          • Question 24 of 25
            24. Question
            4 points

            Match the file system term used in Linux to the function.

             

            Sort elements
            • ext4
            • journaling
            • swap file system
            • MBR
            • supports increased file sizes
              • minimizes file corruption risk in the event of power loss
                • provides hard drive space that holds inactive RAM content
                  • stores information about how the file system is organized
                    Correct

                    Incorrect

                  • Question 25 of 25
                    25. Question
                    3 points

                    Match the description to the Linux term. (Not all options are used.)

                     

                    Sort elements
                    • daemon
                    • hardening
                    • symlink
                    • logging
                    • a running background process that does not need user interaction
                      • protecting remote access
                        • a type of file that is a reference to another file or directory
                          Correct

                          Incorrect

                        • CCNA1 v7
                        • CCNA2 v7
                        • CCNA3 v7
                        System Test Exam Answers
                        Modules 1 – 3 Exam Answers
                        Modules 4 – 7 Exam Answers
                        Modules 8 – 10 Exam Answers
                        Modules 11 – 13 Exam Answers
                        Modules 14 – 15 Exam Answers
                        Modules 16 – 17 Exam Answers
                        Practice Final – ITN Answers
                        Course Feedback
                        ITN Practice PT Skills Assessment (PTSA)
                        Final Exam Answers
                        Modules 1 – 4 Exam Answers
                        Modules 5 – 6 Exam Answers
                        Modules 7 – 9 Exam Answers
                        Modules 10 – 13 Exam Answers
                        Modules 14 – 16 Exam Answers
                        ITN Practice Skills Assessment – PT Answers
                        SRWE Practice Skills Assessment – PT Part 1 Answers
                        SRWE Practice Skills Assessment – PT Part 2 Answers
                        SRWE Hands On Skills Exam Answers
                        SRWE Practice Final Exam Answers
                        SRWE Final Exam Answers 
                        Modules 1 – 2 Exam Answers
                        Modules 3 – 5 Exam Answers
                        Modules 6 – 8 Exam Answers
                        Modules 9 – 12 Exam Answers
                        Modules 13 – 14 Exam Answers
                        ITN Practice PT Skills Assessment (PTSA) Answers
                        SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                        SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                        ENSA Practice PT Skills Assessment (PTSA) Answers
                        ENSA Hands On Skills Exam Answers
                        Practice Final – ENSA Answers
                        ENSA Final Exam Answers
                        CCNA Certification Practice Exam Answers

                        Copyright © 2023 PressExam.