CompTIA A+ 1102 exam Practice Test 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Linux command that allows to create, view, and concatenate files is known as: echo concat printf cat

cat

Which of the following answers refers to a Linux network administration command-line utility used for DNS queries? ping tracert dig pathping

dig

A Linux command-line utility used to search for files and directories is called: find path search grep

find

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is known as: rm chmod find grep

grep

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as: ACL CSR DLP AUP

ACL

Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? CRL NAT BCP ACL

ACL

Which of the following Linux utilities can be used for creating backups? dd cpio rsync tar dump All of the above

All of the above

Which of the following is an example of a soft authentication token? Key fob USB token Authenticator app Smart card

Authenticator app

What is Samba? (Select all that apply) Cross-platform printer sharing solution Open-source implementation of CIFS Linux web server software Cross-platform network file sharing solution Open-source implementation of SMB

Cross-platform printer sharing solution, Open-source implementation of CIFS, Open-source implementation of SMB, Cross-platform network file sharing solution

Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures? MFA MMC MDM MFD

MDM

Which type of software enables a centralized administration of mobile devices? MFA MMC MDM MFD

MDM

Which of the examples listed below meets the requirement of multifactor authentication? Password and biometric scan Username and PIN Smart card and ID badge Voice recognition and fingerprint scan

Password and biometric scan

Which of the Linux utilities listed below can be used to display real-time system resources utilization statistics? taskmgr top nbtstat tasklist

top

What are the characteristic features of SMB/CIFS? (Select all that apply) Used mainly by computers running Linux distributions Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems Enables voice and multimedia communications over IP networks

Provides shared access to files, directories, and devices, Used mainly by computers running Microsoft Windows operating systems

Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply) ACL RFID badge Key fob PIN Smart card

RFID badge, Key fob, Smart card

Examples of biometric devices include: (Select all that apply) OCR scanner Retina scanner ICR scanner Fingerprint scanner Palmprint scanner

Retina scanner, Fingerprint scanner, Palmprint scanner

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege. True False

True

An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door. True False

True

Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). The categories of authentication attributes include geolocation ("somewhere you are"), user-specific activity patterns, such as keyboard typing style ("something you can do"), revealing something about an individual, e.g., wearing an ID badge ("something you exhibit"), or proving the relation with a trusted third party ("someone you know"). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories. True False

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes. True False

True

In the context of physical security, a magnetometer is a device used for detecting metal objects. True False

True

Which of the following commands in Linux can be used to display help information related to a specific command-line command/utility? [command name] help man [command name] [command name] info help [command name] [command name] /?

man [command name]

Which of the answers listed below refers to a Linux command-line text editor? nano gVim Notepad gedit

nano

What is the name of a Linux command-line utility used for displaying a snapshot of running processes? ps tasklist nbtstat id

ps

Which Linux command-line utility provides a functionality similar to Windows Task Manager? tasklist iostat top Get-Process

top


Ensembles d'études connexes

MKTG 380 -- Safavi -- WWU -- FINAL ASSIGNMENTS

View Set

Functional Assessment and Behavior Intervention Plans

View Set

Anna's Ultimate Exam Practice Test

View Set

Health Promotion of Infants (2 days to 1 year)

View Set

Frequently Missed Questions for Producer Licensing Exam

View Set

Chapter 22 Check your understandings

View Set