Q.1
How many tables may be included with a join?
  • One
  • Two
  • Three
  • All of the Mentioned
Q.2
The SQL ALTER statement can be used to?
  • change the table data
  • change the table structure
  • delete rows from the table
  • add rows to the table
Q.3
With SQL, how do you select a column named "FirstName" from a table named "Persons"?
  • SELECT Persons.FirstName
  • EXTRACT FirstName FROM Persons
  • SELECT FirstName FROM Persons
Q.4
The command to remove rows from a table 'CUSTOMER' is
  • DROP FROM CUSTOMER ..
  • UPDATE FROM CUSTOMER ..
  • REMOVE FROM CUSTOMER ..
  • DELETE FROM CUSTOMER WHERE ..
Q.5
We add data to PostgreSQL by using which statement?
  • ADD
  • INSERT
  • UPDATE
  • SELECT
Q.6
Which of the following is not a type of backup?
  • database backup
  • data backup
  • table backup
  • all of the mentioned
Q.7
A named collection of tables is called what in PostgreSQL?
  • Trigger
  • View
  • Schema
  • Diagram
Q.8
If you don’t specify ASC or DESC, PostgreSQL will assume you want to see results:
  • in ascending order
  • grouped together by field type
  • in a random order
  • in descending order
Q.9
Unless you specify NOT NULL, PostgreSQL will assume that a column is:
  • Text
  • Required
  • Optional
  • Integers
Q.10
Which of the following tasks can be performed with the tool NTDS Audit?
  • Show the last login date/time of each administrative user
  • Show the last login date/time of each non-administrative user.
  • Identify the number of accounts with non-expiring passwords
  • Give information about domain controllers that have weak network encryption
Q.11
The condition to check against a list of values is?
  • DISTINCT
  • IN
  • LIKE
  • BETWEEN
Q.12
What is one mistake network administrators often make from a security perspective? (choose the best answer per the lecture)
  • Enforcing password security on users who do not require it.
  • Forgetting passwords on systems since they have too many passwords.
  • Not writing passwords down in a safe place, such as a sticky note on your workstation.
  • Using domain admin privileged accounts for day-to-day non-admin use.
Q.13
Ultimately, who should be responsible for security in an organization?
  • An IT staff member.
  • A non-IT staff member.
  • A person with the authority to set policy and affect change through the organization.
  • All of these answers are correct.
Q.14
What is the term for technology that restricts access to networks or services based upon the user's geographical location? (e.g. 'Only people located in Canada are allowed to connect to our VPN')
  • Geoblocking
  • TTL: Topographic Traffic Limiting
  • Domain Filtering
  • TLD Filtering
Q.15
The PostgreSQL keyword BETWEEN is used:
  • to limit the column displayed
  • for ranges
  • as a wildcard
  • None of these are correct.
Q.16
In SELECT statement querying a single table, the asterisk (*) means that:
  • All columns of the table are to be returned
  • All records meeting the full criteria are to be returned
  • All records with even partial criteria met are to be returned
  • None of the above is correct
Q.17
The SQL WHERE clause:
  • limits the row data are returned
  • limits the column data that are returned
  • Both A and B correct
  • Neither A nor B are correct
Q.18
Your company works in the medical industry and sales people have access to confidential medical records located in spreadsheets on their laptops. What is the most important strategy to limit your company risk from a laptop getting (physically) stolen?
  • Make sure that all laptop accounts as setup as active directory domain accounts with strong passwords.
  • Use full disk encryption with strong passwords on all laptops.
  • Create a group policy that requires .xlsx files to be password protected in Excel.
  • Ensure that all laptops have up to date anti-virus scanners
  • Install tracking software like LoJack on all company laptops.
Q.19
True or False: When configuring secure password policies, it is important to set a minimum password age. (e.g. 1 day)
  • True
  • False
Q.20
Metasploit is an exploitation tool that has multiple user interfaces. Which of the options below is a valid user interfaces for Metasploit?
  • armitage
  • msfconsole
  • crowdstrike
  • Both A & B
0 h : 0 m : 1 s