CompTIA A+ 1102 exam Practice Test 11
A Linux command that allows to create, view, and concatenate files is known as: echo concat printf cat
cat
Which of the following answers refers to a Linux network administration command-line utility used for DNS queries? ping tracert dig pathping
dig
A Linux command-line utility used to search for files and directories is called: find path search grep
find
A Linux command-line command that enables searching files for lines containing a match to a given text pattern is known as: rm chmod find grep
grep
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as: ACL CSR DLP AUP
ACL
Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? CRL NAT BCP ACL
ACL
Which of the following Linux utilities can be used for creating backups? dd cpio rsync tar dump All of the above
All of the above
Which of the following is an example of a soft authentication token? Key fob USB token Authenticator app Smart card
Authenticator app
What is Samba? (Select all that apply) Cross-platform printer sharing solution Open-source implementation of CIFS Linux web server software Cross-platform network file sharing solution Open-source implementation of SMB
Cross-platform printer sharing solution, Open-source implementation of CIFS, Open-source implementation of SMB, Cross-platform network file sharing solution
Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures? MFA MMC MDM MFD
MDM
Which type of software enables a centralized administration of mobile devices? MFA MMC MDM MFD
MDM
Which of the examples listed below meets the requirement of multifactor authentication? Password and biometric scan Username and PIN Smart card and ID badge Voice recognition and fingerprint scan
Password and biometric scan
Which of the Linux utilities listed below can be used to display real-time system resources utilization statistics? taskmgr top nbtstat tasklist
top
What are the characteristic features of SMB/CIFS? (Select all that apply) Used mainly by computers running Linux distributions Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems Enables voice and multimedia communications over IP networks
Provides shared access to files, directories, and devices, Used mainly by computers running Microsoft Windows operating systems
Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply) ACL RFID badge Key fob PIN Smart card
RFID badge, Key fob, Smart card
Examples of biometric devices include: (Select all that apply) OCR scanner Retina scanner ICR scanner Fingerprint scanner Palmprint scanner
Retina scanner, Fingerprint scanner, Palmprint scanner
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege. True False
True
An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door. True False
True
Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). The categories of authentication attributes include geolocation ("somewhere you are"), user-specific activity patterns, such as keyboard typing style ("something you can do"), revealing something about an individual, e.g., wearing an ID badge ("something you exhibit"), or proving the relation with a trusted third party ("someone you know"). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories. True False
True
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes. True False
True
In the context of physical security, a magnetometer is a device used for detecting metal objects. True False
True
Which of the following commands in Linux can be used to display help information related to a specific command-line command/utility? [command name] help man [command name] [command name] info help [command name] [command name] /?
man [command name]
Which of the answers listed below refers to a Linux command-line text editor? nano gVim Notepad gedit
nano
What is the name of a Linux command-line utility used for displaying a snapshot of running processes? ps tasklist nbtstat id
ps
Which Linux command-line utility provides a functionality similar to Windows Task Manager? tasklist iostat top Get-Process
top