CIS 321 PowerShell Scripting

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Trusted Protection Module

A ____ is a microchip that performs basic security tasks with encryption keys.

man-in-the-middle

A(n) ____ attack involves placing a computer between two communicating computers in a network connection. This computer impersonates each machine in the transaction, giving the computer the ability to read or modify communications between the two computers.

exception

A(n) ____ is an instruction to open a port briefly, allow a program or service to pass information, and then close the port.

6

According to Microsoft, how many different categories of Win32 classes exist? For example the Computer System Hardware Class category.

challenge-response protocol

All forms of NTLM use the ____.

False

Any PowerShell script can only access either a WMI or ADSI database.

True

Before you set the value of any variable in a PowerShell Script, you should always initialize the value.

The current directory

By default, which of the following locations does PowerShell not search for commands?

network profile

Clients use a(n) ____ to determine to what type of network they are connected.

True

EFS uses a combination of private and public key encryption for securing a user's data.

Internet Key Exchange

For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.

transport mode

IPSec's ____ provides end-to-end security between devices or hosts, such as between a client and server or for Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) solutions for remote access.

tunnel mode

IPSec's ____ provides secure communications between two networks through a single node.

You see the first possible parameter name for the ChildItem command

If you enter the following PowerShell Command: Get-ChildItem -[Tab] What happens?

Add 100 users

If you used PowerShell on a regular basis, which of the following tasks would probably be performed faster using PowerShell?

Items that end with the text "security" Entries that have the text "security" inside their time Entries that start with the text "security"

If you used the string "*security*" in a command what selection criterion is being requested.

-ComputerName DC1,W10-CLIENT,W7-CLIENT

If you wanted to include a list of computer names, which included DC1, W7-CLIENT and W10-CLIENT, which of the following formats would work?

Get-Command Noun Item

In PowerShell, How do you view all commands that contain the noun item?

Get-Command -Verb Set

In PowerShell, how do you list all command that have a verb named Set?

Get-Command Set*

In PowerShell, how do you list commands that begin with the characters "set?"

Get-Command *Item

In PowerShell, how do you list commands which end with the string "item?"

Get-Command -ParameterName ComputerName

In PowerShell, what can be used to find commands that can be run against a remote machine?

Get-Command *Computer*

In PowerShell, what command would you use to find commands which contain the string "Computer?"

It displays the first available commands starting with the characters "Cert"

In PowerShell, what does the command Get-Cert [Tab] do?

Import-Module -Name DnsClient

In PowerShell, what is the command to import the DnsClient Module

Contain compulsory arguments

In PowerShell, what is the significance of curved parenthesis brackets ()?

Contain optional items

In PowerShell, what is the significance of square brackets [ ]?

Access Control Lists

In PowerShell, which of the following is not a Win32 Class category?

Get-Module -ListAvailable

In PowerShell,what is the command to list all the available cmdlets?

You have to enter a 32-bit integer

In a description of the command syntax, what does the string "<int32>" mean?

A red squiggle underneath the error

In the PowerShell ISE, how are syntax errors shown?

The content inside the square brackets is optional

In the description of the syntax for a command, what do square brackets mean?

GUI, Command Line, PowerShell

In which of the following ways can you perform system administration, such as add a user and a group on a Windows computer?

Clear: Erase or Remove Information Write: Write Information to the Screen Copy: Copy an Object

Match the common PowerShell verbs with their meanings.

False

Secure Socket Layer (SSL) and Secure Shell (SSH) can protect Transport layer protocols and information such as TCP and UDP.

True

The Monitoring section of the WFAS console provides you with real-time information about active connections passing through the Windows Firewall.

Network Policy Server

The ____ is responsible for managing the network health and connectivity policies on a network.

preshared keys

The term ____ refers to a form of authentication that uses a string of characters that is provided to all IPSec peers participating in the communications.

Format-Table

To format output as a table, what syntax would you use in the piped command?

enhanced security mode

Using BitLocker with a TPM and a PIN or a USB flash drive is called ____.

Cmdlets

What are PowerShell built-in commands called?

<!-- and --!>

What are the beginning and ending characters used to designate a block containing comment lines?

<# and #>

What are the beginning and ending characters used to designate a block containing comment lines?

Get-WMIObject

What command is used to query the WMI database?

Active Directory Service Interfaces

What do the letters ADSI stand for?

Integrated Scripting Environment

What do the letters ISE stand for in the PowerShell ISE application?

Windows Management Instrumentation

What does WMI stand for?

Information about topics related to PowerShell

What does the Get-Help about_* command provide for users?

Intellisense

What feature of the PowerShell ISE helps you avoid syntax errors?

F7

What function key will open up a window showing you the history of commands you have entered in PowerShell?

MAC Address

What information is not contained in the Win32_Network_AdapterConfiguration Class?

NIC Vendor

What information is not stored in the win32_ComputerSystemProduct class?

A GUI application, which helps develop PowerShell scripts

What is Windows PowerShell ISE?

The parameter has to be in a certain position (order)

What is a positional parameter in a command?

.ps1

What is the default extension for a PowerShell file?

True

When a user encrypts a file, a symmetric file encryption key (FEK) is generated that EFS uses to encrypt the file.

Parameters

When you use the basic help command, which of the following is not a section of the basic help page?

Separate the numbers by commas

When you want to add the values of several numbers to an array, which of the following ways would work?

Separate each string by double quotation marks, and separate elements by commas

When you want to create an array containing strings, which of the following ways is correct?

# sign

Which is the symbol used to designate a line in a PowerShell script as a comment

0

Which of following is the correct answer for the question about the number of the first element in an array.

Reset a user's password

Which of the following administrative tasks might be better performed by using a GUI, instead of PowerShell?

It allows you send the output from one command to be further processed by additional command(s)

Which of the following answers best describes the benefits of using the Pipe ("|") character in a command?

A space

Which of the following characters is used to separate each part in the text of single command line?

Get-Process *svc*

Which of the following commands will list all of the processes that contain the string "svc"?

Remove-ADUser

Which of the following commands would be used to delete a user from Active Directory?

Get-ADGroupMember

Which of the following commands would be used to view the members of an Active Directory Group?

Get-Help about_Switch

Which of the following commands would you use to view the PowerShell help topic about the Switch statement?

WMI Events

Which of the following information is not contained in the ADSI database?

Less error prone

Which of the following is an advantage of using scripts?

Active Directory

Which of the following is not a Win32 Class Category

Is text based

Which of the following is not a key characteristic of PowerShell?

Statement

Which of the following is not a type of coding error?

Webmin

Which of the following is not a type of interface for Windows administration?

verb-adjective

Which of the following is the basic format for a PowerShell cmdlet?

verb-noun

Which of the following is the basic format for a PowerShell cmdlet?

command [argument...]

Which of the following is the basic format for a command line statement?

-full, -detailed, -online, or -ShowWindow

Which of the following is the correct list of the available parameters, which can be used when running the Get-Help command.

It can contain a string, an integer and a floating point number

Which of the following is true of a PowerShell variable?

-Computers

Which of the following parameters can be used to run a command on multiple computers?

Related Links

Which of the following sections is not a part of the detailed help?

Provisioning a computer system for deployment

Which of the following tasks should be scripted?

Installed Software

Which of the following types of information is not contained in the ADSI database?

Installed software

Which of the following types of information is not contained in the ADSI database?

Initialization

Which of the sections of a script contain variable declarations and assignments?

False

Windows Firewall does not allow you to create exceptions for inbound traffic.

PublicKey Encryption

With ____, each user has a public key that is available to everyone and a private key that is known only to the user.

public key encryption

With ____, each user has a public key that is available to everyone and a private key that is known only to the user.

Give selections that end with the text "security"

You can use text similar to "*security" as a filter. What does this mean?

Denial of service

____ attacks are performed by flooding a host or a network router with more traffic than it can handle.

Network traffic sniffing

____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.

Repudiation

____ involves users who deny that they performed a malicious action on a network, and administrators do not have a way to prove them wrong.

Cipher.exe

____ is a command-line utility that allows you to manage EFS through scripts or the command prompt.

Encapsulating Security Payload

____ is the default IPSec security protocol in Windows Server 2008 and is defined by RFC 4303.

Authentication Header

____ provides authentication and integrity services but does not provide confidentiality because data encryption is not supported.

BitLocker

____ provides hard drive-based encryption of servers and Windows Vista computers.

Symmetric encryption

____ uses a single key and is faster and more efficient than public key encryption, especially for very large file

Comments

______are used in a script to clarify code or provide additional information to other programmers.


Set pelajaran terkait

Ch 7 - Production, Costs, and Industry Structure

View Set

Cambell Biology Chapter 21: Genomes and their Evolution

View Set

Chapter 15: The new millennium: cybercrime (crim)

View Set

Physical Science B | Module 2 | Lesson 4: Quiz: "First Law of Thermodynamics"

View Set

OB Pillitteri 7th Edition Chapter 6

View Set

Life and People in the 13 Colonies

View Set

Microeconomics: Market Structures

View Set

Stats 225 Exam 1 Review - Past Quizzes

View Set

Introduction to Management Science

View Set