CIS 321 PowerShell Scripting
Trusted Protection Module
A ____ is a microchip that performs basic security tasks with encryption keys.
man-in-the-middle
A(n) ____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.
exception
A(n) ____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.
6
According to Microsoft, how many different categories of Win32 classes exist? For example the Computer System Hardware Class category.
challenge-response protocol
All forms of NTLM use the ____.
False
Any PowerShell script can only access either a WMI or ADSI database.
True
Before you set the value of any variable in a PowerShell Script, you should always initialize the value.
The current directory
By default, which of the following locations does PowerShell not search for commands?
network profile
Clients use a(n) ____ to determine to what type of network they are connected.
True
EFS uses a combination of private and public key encryption for securing a user's data.
Internet Key Exchange
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
transport mode
IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) solutions for remote access.
tunnel mode
IPSec's ____ provides secure communications between two networks through a single node.
You see the first possible parameter name for the ChildItem command
If you enter the following PowerShell Command: Get-ChildItem -[Tab] What happens?
Add 100 users
If you used PowerShell on a regular basis, which of the following tasks would probably be performed faster using PowerShell?
Items that end with the text "security" Entries that have the text "security" inside their time Entries that start with the text "security"
If you used the string "*security*" in a command what selection criterion is being requested.
-ComputerName DC1,W10-CLIENT,W7-CLIENT
If you wanted to include a list of computer names, which included DC1, W7-CLIENT and W10-CLIENT, which of the following formats would work?
Get-Command Noun Item
In PowerShell, How do you view all commands that contain the noun item?
Get-Command -Verb Set
In PowerShell, how do you list all command that have a verb named Set?
Get-Command Set*
In PowerShell, how do you list commands that begin with the characters "set?"
Get-Command *Item
In PowerShell, how do you list commands which end with the string "item?"
Get-Command -ParameterName ComputerName
In PowerShell, what can be used to find commands that can be run against a remote machine?
Get-Command *Computer*
In PowerShell, what command would you use to find commands which contain the string "Computer?"
It displays the first available commands starting with the characters "Cert"
In PowerShell, what does the command Get-Cert [Tab] do?
Import-Module -Name DnsClient
In PowerShell, what is the command to import the DnsClient Module
Contain compulsory arguments
In PowerShell, what is the significance of curved parenthesis brackets ()?
Contain optional items
In PowerShell, what is the significance of square brackets [ ]?
Access Control Lists
In PowerShell, which of the following is not a Win32 Class category?
Get-Module -ListAvailable
In PowerShell,what is the command to list all the available cmdlets?
You have to enter a 32-bit integer
In a description of the command syntax, what does the string "<int32>" mean?
A red squiggle underneath the error
In the PowerShell ISE, how are syntax errors shown?
The content inside the square brackets is optional
In the description of the syntax for a command, what do square brackets mean?
GUI, Command Line, PowerShell
In which of the following ways can you perform system administration, such as add a user and a group on a Windows computer?
Clear: Erase or Remove Information Write: Write Information to the Screen Copy: Copy an Object
Match the common PowerShell verbs with their meanings.
False
Secure Socket Layer (SSL) and Secure Shell (SSH) can protect Transport layer protocols and information such as TCP and UDP.
True
The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.
Network Policy Server
The ____ is responsible for managing the network health and connectivity policies on a network.
preshared keys
The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.
Format-Table
To format output as a table, what syntax would you use in the piped command?
enhanced security mode
Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.
Cmdlets
What are PowerShell built-in commands called?
<!-- and --!>
What are the beginning and ending characters used to designate a block containing comment lines?
<# and #>
What are the beginning and ending characters used to designate a block containing comment lines?
Get-WMIObject
What command is used to query the WMI database?
Active Directory Service Interfaces
What do the letters ADSI stand for?
Integrated Scripting Environment
What do the letters ISE stand for in the PowerShell ISE application?
Windows Management Instrumentation
What does WMI stand for?
Information about topics related to PowerShell
What does the Get-Help about_* command provide for users?
Intellisense
What feature of the PowerShell ISE helps you avoid syntax errors?
F7
What function key will open up a window showing you the history of commands you have entered in PowerShell?
MAC Address
What information is not contained in the Win32_Network_AdapterConfiguration Class?
NIC Vendor
What information is not stored in the win32_ComputerSystemProduct class?
A GUI application, which helps develop PowerShell scripts
What is Windows PowerShell ISE?
The parameter has to be in a certain position (order)
What is a positional parameter in a command?
.ps1
What is the default extension for a PowerShell file?
True
When a user encrypts a file, a symmetric file encryption key (FEK) is generated that EFS uses to encrypt the file.
Parameters
When you use the basic help command, which of the following is not a section of the basic help page?
Separate the numbers by commas
When you want to add the values of several numbers to an array, which of the following ways would work?
Separate each string by double quotation marks, and separate elements by commas
When you want to create an array containing strings, which of the following ways is correct?
# sign
Which is the symbol used to designate a line in a PowerShell script as a comment
0
Which of following is the correct answer for the question about the number of the first element in an array.
Reset a user's password
Which of the following administrative tasks might be better performed by using a GUI, instead of PowerShell?
It allows you send the output from one command to be further processed by additional command(s)
Which of the following answers best describes the benefits of using the Pipe ("|") character in a command?
A space
Which of the following characters is used to separate each part in the text of single command line?
Get-Process *svc*
Which of the following commands will list all of the processes that contain the string "svc"?
Remove-ADUser
Which of the following commands would be used to delete a user from Active Directory?
Get-ADGroupMember
Which of the following commands would be used to view the members of an Active Directory Group?
Get-Help about_Switch
Which of the following commands would you use to view the PowerShell help topic about the Switch statement?
WMI Events
Which of the following information is not contained in the ADSI database?
Less error prone
Which of the following is an advantage of using scripts?
Active Directory
Which of the following is not a Win32 Class Category
Is text based
Which of the following is not a key characteristic of PowerShell?
Statement
Which of the following is not a type of coding error?
Webmin
Which of the following is not a type of interface for Windows administration?
verb-adjective
Which of the following is the basic format for a PowerShell cmdlet?
verb-noun
Which of the following is the basic format for a PowerShell cmdlet?
command [argument...]
Which of the following is the basic format for a command line statement?
-full, -detailed, -online, or -ShowWindow
Which of the following is the correct list of the available parameters, which can be used when running the Get-Help command.
It can contain a string, an integer and a floating point number
Which of the following is true of a PowerShell variable?
-Computers
Which of the following parameters can be used to run a command on multiple computers?
Related Links
Which of the following sections is not a part of the detailed help?
Provisioning a computer system for deployment
Which of the following tasks should be scripted?
Installed Software
Which of the following types of information is not contained in the ADSI database?
Installed software
Which of the following types of information is not contained in the ADSI database?
Initialization
Which of the sections of a script contain variable declarations and assignments?
False
Windows Firewall does not allow you to create exceptions for inbound traffic.
PublicKey Encryption
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
public key encryption
With ____, each user has a public key that is available to everyone and a private key that is known only to the user.
Give selections that end with the text "security"
You can use text similar to "*security" as a filter. What does this mean?
Denial of service
____ attacks are performed by flooding a host or a network router with more traffic than it can handle.
Network traffic sniffing
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
Repudiation
____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.
Cipher.exe
____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.
Encapsulating Security Payload
____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.
Authentication Header
____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.
BitLocker
____ provides hard drive-based encryption of servers and Windows Vista computers.
Symmetric encryption
____ uses a single key and is faster and more efficient than public key encryption, especially for very large file
Comments
______are used in a script to clarify code or provide additional information to other programmers.