CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 3 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

SSH Client -> <- SSH Server Which well-known port number is used by the server

22

What is the well-known port address number used by DNS to serve requests? 53 110 60 25

53

stores information about how the file system is organized

MBR

/var/log/dmesg

stores information related to hardware devices and their drivers

What is a purpose of apt-get commands? to configure and manage task (to-do) lists to configure an appointment for a specific date and time to apportion and configure a part of the hard disk for file storage to update the operating system

to update the operating system

/var/log/auth.log

used by Debian and Ubuntu computers and stores all authentication-related events

Which file system is the primary file system used by Apple in current Macintosh computers? ext2 HFS+ ext3 APFS CDFS

APFS

Which two methods can be used to harden a computing device? (Choose two.) Allow default services to remain enabled. Enforce the password history mechanism. Ensure physical security. Allow USB auto-detection. Update patches on a strict annual basis irrespective of release date.

Enforce the password history mechanism. Ensure physical security.

What is the purpose of a Linux package manager? It is used to compile code that creates an application. It provides a short list of tasks a particular application can perform. It provides access to settings and the shutdown function. It is used to install an application.

It is used to install an application.

1 Which two Linux commands might be used before using the kill command? (Choose two.) ps top chroot ls grep

PS,. Top

Why would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)? It is easier to use than other operating systems. More network applications are created for this environment. The administrator has more control over the operating system. It is more secure than other server operating systems.

The administrator has more control over the operating system.

How is a server different from a workstation computer? The server is designed to provide services to clients. The workstation has more users who attach to it. The workstation has fewer applications installed. The server works as a standalone computer.

The server is designed to provide services to clients.

daemon

a running background process that does not need user interaction

symlink

a type of file that is a reference another file or directory

/var/log/messages

contains generic computer activity logs, and is used to store informational and noncritical system messages

Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss? ext3 NFS CDFS ext2

ext3

supports increased file sizes

ext4

Why is Linux considered to be better protected against malware than other operating systems? customizable penetration and protection tools integrated firewall fewer deployments file system structure, file permissions, and user account restrictions

file system structure, file permissions, and user account restrictions

What is the method employed by a Linux kernel to create new processes for multitasking of a process? creating interdependent processes forking dynamic processes pipelining

forking

minimizes file corruption risk in the event of power loss

journaling

Which Linux command is used to manage processes? ls grep kill chrootkit

kill

Which type of tool allows administrators to observe and understand every detail of a network transaction? malware analysis tool log manager packet capture software ticketing system

packet capture software

What term is used for operating system updates? penetration testing new releases packages patches

patches

Hardening

protecting remote access

Which Linux command can be used to display the name of the current working directory? sudo pwd chmod ps

pwd

Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file? ls -l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt read, write, execute write only read only read, write

read, write, execute

Which user can override file permissions on a Linux computer? any user that has 'other' permission to the file root user any user that has 'group' permission to the file only the creator of the file

root user

What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed? compiler penetration testing package manager rootkit

rootkit

Which command can be utilized to view log entries of NGINX system events in real time? sudo journalctl -until "1 hour ago" sudo journalctl -u nginx.service -f sudo journalctl -f sudo journalctl -u nginx.services

sudo journalctl -u nginx.service -f

provides hard drive space that holds inactive RAM content

swap file system

A Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment? system viewer package management tool terminal emulator file viewer

terminal emulator

What is the main purpose of the X Window System? to provide remote access to a Linux-based system to provide a basic set of penetration testing tools to provide a customizable CLI environment to provide a basic framework for a GUI

to provide a basic framework for a GUI

/var/log/secure

used by RedHat and CentOS computers and tracks authentication-related events


Conjuntos de estudio relacionados

Econ Exam 4 (last semesters test)

View Set

7.16.W - Test Review: Europe, Russia & Central Asia (Practice) [SECTION 1]

View Set

Building materials Fastener and Adhesives

View Set

APUSH chapters 17, 18, 19 study guide

View Set

Life insurance and annuities- policy replacement and cancellation

View Set