Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Study tips SY0-201

Which of the following would be the BEST choice to ensure only ports 25, 80 and 443 were open from outside of the network?

Which of the following could be used to determine which flags are set in a TCP/IP handshake?

Which of the following is a collection of servers that is setup to attract hackers?

Which of the following ports does SNMP run on?

Which of the following type of attacks is TCP/IP hijacking? 107

Which of the following attacks commonly result in a buffer overflow?

Which of the following is an area of the network infrastructure that allows a technician to place public facing systems into it without compromising the entire infrastructure?

Which of the following creates separate logical networks?

Which of the following would allow a technician to compile a visual view of an infrastructure?

Which of the following hashing algorithms is the MOST secure?

Posts navigation

Previous 1 … 8 9 10 … 45 Next
Equizzing
    Privacy Policy

© 2025 Equizzing