0 of 10 Questions completed
Questions:
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
Any |
20.5.30.40 |
22 |
allow |
2 |
Any |
20.5.30.140 |
80 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Use SSH connection to connect to 20.5.30.40
Use SSH connection to connect to 20.5.30.140
Request an unsecured web page on 20.5.30.140
Request a secured web page on 20.5.30.140
Match the description with the most accurate attack type.
Α type of social engineering attack which is used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity
|
|
An attack that is implemented through text messages or SMS. The criminal executes the attack with the intent to gather personal information, including social insurance and/or credit card numbers
|
|
A phone attack designed to get you to share personal information. The attacker uses social engineering to get you to share personal information and financial details, such as account numbers and passwords
|
|
An email or electronic communications scam targeted towards a specific individual, organization or business
|
|
Configure the following stateful firewall rules:
• Allow the File Server to access the Database Server using LDAP
• Block the Storage Server to transfer files to the Web Server using FTP
• Allow the FTP Server to transfer files to the Mail Server over HTTPS
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Match the characteristic to the attack type:
A type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker
|
|
An attack that shuts down a machine or network, making it inaccessible to its intended users
|
|
An attacker impersonates an authorized device or user to steal data, spread malware, or bypass access control systems
|
|
The act of changing the registration of a domain name without the permission of the original owner
|
|
You are troubleshooting a faulty network. You need to illustrate the route packets take through the inter-network in order to identify the weak spot. Assuming you are working on a Windows environment, type the command to find where the packets are dropped.
C:\>
Type the Windows command-line utility that produces the following output.
Active Connections Proto Local Address Foreign Address State TCP 127.0.0.1:7869 CZ111:49770 ESTABLISHED TCP 127.0.0.1:49770 CZ222:7869 ESTABLISHED TCP 127.0.0.1:25678 CZ333:25678 ESTABLISHED TCP 192.168.44.55:4567 RJ-N22P:42173 ESTABLISHED TCP 192.168.44.55:4567 RJ-N22P:44356 ESTABLISHED TCP 192.168.44.55:49770 autodiscover:https ESTABLISHED TCP 192.168.44.55:49770 autodiscover:https ESTABLISHED TCP 192.168.44.55:25678 91-14-55-5:https ESTABLISHED
C:\>
You are at a Windows 10 workstation and have a command prompt open. Type the command to view resource record information on a particular DNS server.
C:\>
You want to capture HTTP packets using tcpdump. The HTTP service is running on its default port and your Ethernet adapter is eth1. Type the command to capture the packets.
student@dojolab:~$
You need to search and display the total number of times that the tag “h1” appears in a file named main.html using grep. Type the Linux command for it.
student@dojolab:~$
You are working at a Linux command prompt. Set the permissions of file.txt to “owner can read and write; group can read only; others can read only” using octal permissions notation.
student@dojolab:~$