cram 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

.sh

You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?

tracert

Which of the following commands is used on a Linux system to copy a file from one directory to another directory?

cp

Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address?

192.168.3.5

What is the minimum amount of memory required to install Windows 10 (x64) on a device?

2gb

How would you represent the Linux permissions rwxr-xr-- in octal notation?

754

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

Asset ID

John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled?

BIOS password required

David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

Developer mode

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier?

Subnet mask

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?

Explicit allow for inbound, implicit allow for outbound

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

Grandfather-father-son

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

NAT

Which file system type is used to mount remote storage devices on a Linux system?

NFS

Which of the following Control Panel sections would allow a technician to turn on Hyper-V on a Windows 10 Pro workstation?

Programs and Features

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

Purpose

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

Telnet

A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?

Remove any proxy servers configured in their web browser

Which of the following data types would be used to store a user's name?

String

Which of the following is a connectionless protocol that utilizes on UDP?

TFTP

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

dhcp failure

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use Android smartphones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

Use social engineering to trick a user into opening a malicious APK

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

Worm

A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in Celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?

constant

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

bootrec/fixmbr

Which Linux command is used to print the full contents of a file to the screen at once?

cat

You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?

chkdsk

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address?

mac address

Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

mv

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

spear phishing


Ensembles d'études connexes

8.1 Loss Grief Dying and End of Life Care

View Set

Chapter 9: The Impact Divorce on Children

View Set

Fundamentals of Success Mobility

View Set

Chapter 18: "Reproductive and Genetic Disorders"

View Set

Saylor Academy: Intro to Financial Accounting

View Set

MEGGS History of Graphic Design chapter 9

View Set

Dialogue 1 - English French Anglais Français - Hi What's your name? - Bonjour Comment t'appelles-tu?

View Set