Unit 1 - Linux Basics
______ is the process of reducing or eliminating an unwanted magnetic field (or data) stored on tape and disk media such as computer and laptop hard drives, diskettes, reels, cassettes and cartridge tapes. A. Degaussing B. Electromagnetism C. Demagnetizing D. Ionization
A. Degaussing
What is data purging? A. Permanently deleting data so it can't be recovered by standard methods B. Using software or hardware products to overwrite storage space on the media with non-sensitive data C. Both of the above D. None of the above
A. Permanently deleting data so it can't be recovered by standard methods
What does the command "nslookup" do? A. Provides simple lookup of domain names and matching IP addresses B. Provides complex lookup of domain names and matching IP addresses C. Provides simple lookup of domain names and matching Physical addresses D. Provides simple lookup of domain names and matching hexadecimal addresses
A. Provides simple lookup of domain names and matching IP addresses
______ allows a user to remotely connect and control another system. A. SSH B. SHA C. Pcl D. RSA
A. SSH
What will happen if a file output is not enabled when using tcpdump? A. The results will be displayed on screen B. The results will be saved in the tcpdump directory C. The results will be saved in the etc directory D. The results will be saved in the documents directory
A. The results will be displayed on screen
An organizations should have policies for shredding documents. A. True B. False
A. True
What is the file format for PowerShell? A. .py B. .ps1 C. .ps2 D. .sha Answer: B
B. .ps1
4. What is a script? A. A predefined line of code to reboot a system B. A series of commands that automate a task for the user C. A document included with each application download D. The user interface that allows a user to communicate with a system
B. A series of commands that automate a task for the user
A ______ is a formal document containing detailed information about the destruction of your data. A. Proof of elimination B. Destruction certificate C. Certificate of shredding D. Clear packet
B. Destruction certificate
What does the "ip link show" command do? A. Displays status of network packet devices B. Displays status of network link layer devices C. Displays status of netflow link layer devices D. Displays status of network record devices
B. Displays status of network link layer devices
When a file is deleted, it can never be recovered. A. True B. False
B. False
______ involves using a machine to break up the components of a storage device, completely destroying the device. A. Evisceration B. Pulverization C. Drilling D. Hammering
B. Pulverization
What does NMAP allow you to do? A. Search for web applications on a network B. Search for hosts on a network C. Search for files on a network D. Search for packets on a network
B. Search for hosts on a network
What does TTL stand for? A. Track to Live B. Time to Live C. Transfer to Live D. Transfer to LiveCD
B. Time to Live
1. A ______ is how a user interacts with an operating system. A. script B. shell C. command D. terminal
B. shell
Which of the following is a packet analyzer? A. tcpreview B. tcpdump C. tcpcatch D. tcpanalyze
B. tcpdump
Which command would show all packets? A. tcpdump icmp B. tcpdump -nn C. tcpdump -af D. tcpdump -all
B. tcpdump -nn
Which of the following is NOT a type of shell? A. GUI B. CLI C. DRA D. None of the above
C. DRA
What does the "traceroute" command do? A. Determines path a file takes to a destination B. Determines path a router takes to a destination C. Determines path a packet takes to a destination D. Determines the time a packet takes to reach a destination
C. Determines path a packet takes to a destination
Which of the following is NOT a type of shredder? A. Cross-cut B. Strip-cut C. Dice-cut D. Micro-cut
C. Dice-cut
What does the "netstat" command do? A. Monitors network packets to and from host B. Monitors netflow connections to and from host C. Monitors network connections to and from host D. Monitors network connections in a single direction
C. Monitors network connections to and from host
What are ipconfig and ifconfig mainly used for? A. Network configuration B. Network investigation C. Network troubleshooting D. Network bandwidth
C. Network troubleshooting
What is the name of the process of turning paper into pulp through a chemical process and reconstituting it as recycled paper? A. Mashing B. Demolecularization C. Pulping D. None of the above
C. Pulping
How do Wireshark and tcpdump compare/contrast? A. They both have GUIs B. They both use CLIs C. Tcpdump uses a CLI D. Wireshark uses a CLI
C. Tcpdump uses a CLI
Which of the following is the CLI for Windows? A. Terminal B. regedit C. Command Prompt D. Windows Explorer
C. command prompt
What is the difference between ipconfig and ifconfig? A. ipconfig is for Linux TCP/IP configuration: ifconfig is for Windows interface configuration B. ipconfig is for Linux TCP/IP configuration: ifconfig is for OS X interface configuration C. ipconfig is for Windows TCP/IP configuration: ifconfig is for Linux interface configuration D. None of the above
C. ipconfig is for Windows TCP/IP configuration: ifconfig is for Linux
Which command will overwrite a file with a random array of 1's and 0's? A. clear B. del C. shred D. overwrite
C. shred
What does ARP stand for? A. Address Resolving Protocol B. Address Resolution Packet C. Any Resolution Protocol D. Address Resolution Protocol
D. Address Resolution Protocol
Which of the following is a way to burn documents? A. Use a fire pit B. Use a burn cage C. Use a drum barrel D. All of the above
D. All of the above
Which of the following truly deletes a file? A. DBAN B. sdelete C. Secure Empty Trash D. All of the above
D. All of the above
What protocol does the "ping" command use? A. DHCP B. TCP C. IP D. ICMP
D. ICMP
Which scripting language does Thonny use? A. Java B. Perl C. Pcl D. Python
D. Python