cyber ops chapter 3 notes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

contains generic computer activity logs, and is used to store informational and noncritical system message

/var/log/messages

used by RedHat and Centos computers and tracks authentication related events

/var/log/secure

The image displays a laptop that is acting as the SSH client that is communicating with an SSH server. Refer to the exhibit. Which well-known port number is used by the server

22

What is the well-known port address number used by DNS to serve requests?

53

Which working environment is more user-friendly?

A GUI *

Which file system is the primary file system used by Apple in current Macintosh computers?

APFS

Which types of files are used to manage services in a Linux system?

Configuration files *

Which two methods can be used to harden a computing device

Enforce the password history mechanism. Ensure physical security.

Which method can be used to harden a computing device?

Force periodic password changes. *

What is the purpose of a Linux package manager?

It is used to install an application.

What is a benefit of Linux being an open source operating system

Linux distribution source code can be modified and then recompiled. *

stores information about how the file system is organized

MBR

Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?

PenTesting *

Which term is used to describe a running instance of a computer program?

Process *

Which Linux component would be used to access a short list of tasks theapplication can perform?

Quicklist *

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

Read, write

Why would a network administrator choose Linux as an operating system in the Security Operations Center (SOC

The administrator has more control over the operating system.

What is the outcome when a Linux administrator enters the man man command

The man man command provides documentation about the man command. *

How is a server different from a workstation computer?

The server is designed to provide services to clients

daemon ->

a running background process that does not need user interaction

symlink

a type of file that is a reference to another file or directory

Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss?

ext3

supports increased file sizes

ext4

Why is Linux considered to be better protected against malware than other operating systems?

file system structure, file permissions, and user account restrictions

What is the method employed by a Linux kernel to create new processes for multitasking of a process?

forking

Which Linux command is used to manage processes

kill

Which type of tool allows administrators to observe and understand every detail of a network transaction?

packet capture software

What term is used for operating system updates

patches

hardening

protecting remote access

Which Linux command can be used to display the name of the current working directory?

pwd

Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file

read, write, execute

Which user can override file permissions on a Linux computer?

root user

What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?

rootkit

Which command can be utilized to view log entries of NGINX system events in real time?

sudo journalctl -u nginx.service -f

provides hard drive space that holds inactive RAM content

swap file system

A Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment

terminal emulator

What is the main purpose of the X Window System?

to provide a basic framework for a GUI

What is a purpose of apt-get commands?

to update the operating system

Which two Linux commands might be used before using the kill command? (Choose two.)

top and Ps


संबंधित स्टडी सेट्स

Chapter 15: Schizophrenia Spectrum and Other Psychotic Disorders, Chapter 15: Schizophrenia and Other Psychotic Disorders NCLEX, Chapter 15: Schizophrenia and Schizophrenia Spectrum Disorders, Chapter 25. Depressive Disorders, Chapter 16, Chapter 15:...

View Set

Chapter 4 "Reinforcement & Extinction of Operant Behavior"

View Set

Psychology Statistics Final Practice Exam Part 1

View Set