0 of 15 Questions completed
Questions:
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
You want to see what DNS information can be queried for the website dojopass.org as well as what hostnames and subdomains may exist. Type the command that provides DNS query information for the domain dojopass.org.
student@dojolab:~$
Fill in the blank with the BEST malware type for the description.
– A type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it.
– A type of malware that is often disguised as legitimate software and can be employed by hackers trying to gain access to users’ systems.
– A type of malware that spreads copies of itself from computer to computer.
Fill up the table by typing the class, the network IDs, and the network broadcast from the following IP addresses.
IP Address |
Class |
Network ID |
Network
|
---|---|---|---|
2.3.4.1 |
|
|
|
130.1.2.3 |
|
|
|
209.7.8.9 |
|
|
|
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
5.5.5.5 |
20.5.30.40 |
443 |
allow |
2 |
Any |
20.5.30.140 |
25 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Transfer emails from 1.2.3.4 to 20.5.30.140
Request a secured web page on 20.5.30.40 from 5.5.5.5
Perform a DNS query from 10.1.10.88 to 9.9.9.9
Type the command to retrieve only email-related DNS records for the domain dojopass.org using the -query=mx option.
student@dojolab:~$
Type the command to view the Internet Protocol (IP) configuration on a Linux host.
student@dojolab:~$
You are troubleshooting a faulty network. You need to illustrate the route packets take through the inter-network in order to identify the weak spot. Assuming you are working on a Windows environment, type the command to find where the packets are dropped.
C:\>
You are troubleshooting a Windows 10 workstation that is having issues connecting to the Internet. The computer seems to be able to connect only to websites that have SSL encryption but not to websites beginning with http:// e.g http://example.com. Type the command to check to see whether this workstation is making any TCP/IP connections on port 80.
C:\>
You have a Windows 10 command prompt open. You are in the C:\ directory and want to copy all 4 of the files with a .pdf extension into the C:\myFolder directory. Type the command to copy the files.
C:\> c:\myfolder
Your co-worker recently left the company, and you need to change ownership of his files on the Linux server to a new user. Type the command to do this.
student@dojolab:~$
You want to install patches to upgrade the operating system of your workstation which runs Debian Linux Distribution. Type the command to do this.
student@dojolab:~$
You want to gather open-source intelligence information such as emails from the wgu.edu site using automated tools. Type the command to get a list of email addresses for WGU on a bing search.
student@dojolab:~$
You need to verify the connection to 192.168.0.10 on port 25 and the connection to 192.168.0.11 on port 80 with the help of the telnet command. Type the Windows command-line utility to verify the connections.
1. C:\>
2. C:\>
You want to change some lines of code in the file named dojolab.py. The file contains scripts written in Python. Type the command to open the file and make the changes with the vi editor.
student@dojolab:~$
You need to search and display the total number of times that the tag “h1” appears in a file named main.html using grep. Type the Linux command for it.
student@dojolab:~$