220-1002 Quiz 2 Flashcards
What Windows command partitions disks?
diskpart
Which of the following commands in Windows Command Prompt changes the current directory to the root directory?
cd \
dir /root
cd ..
chdir /r
cd \
What Windows command changes working directory?
cd
What Windows command terminates processes and kills tasks?
taskkill
What Windows command shuts down the computer?
shutdown
In a virtualization environment, a host-based hypervisor is which type of hypervisor?
Type 1
Type 2
Emulated
Bare metal
Type 2
Which type of Hypervisor is VMware Workstation™?
Bare metal
Type 1
Host-based
Intel VT-x
Host-based
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
-a
/?
/all
/a
/all
Which of the following refers to capturing and reading data packets as they move over the network?
MAC (Media Access Control) Flooding
ARP (Address Resolution Protocol) Poisoning
Man-in-the-Middle (MITM)
Eavesdropping
Eavesdropping
What Windows command displays group policy results for the user?
gpresult
What is the name of an MS Windows command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
net use
ipconfig
netstat
ipconfig
What can door locks be categorized as? (Select all that apply.)
Deadbolt
Electronic
Conventional
Token-based
Deadbolt
Electronic
Conventional
Token-based
Which of the following refer to stealing a password or PIN, or other secure information, by watching the user type it?
Tailgating
Impersonation
Shoulder Surfing
Pharming
Shoulder Surfing
A command-line utility used for checking the reachability of a remote network host is known as:
ping
tracert
dig
netstat
ping
When configuring Microsoft Hyper-V as a hypervisor, three types of virtual switches can be created. Which type is used by the virtual machine and the host only?
Internal
Private
External
Emulated
Internal
Netstat is a command-line utility used for: (Select 2 answers)
Displaying active TCP/IP connections
Testing the reachability of a remote host
Displaying intermediary points on the packet route
Viewing the TCP/IP configuration details
Displaying network protocol statistics
Displaying active TCP/IP connections
Displaying network protocol statistics
The use of encryption and other digital security techniques provides users with three important security requirements on computer networks: confidentiality, integrity, and availability. What are the principal types of cryptographic technology? (Select all that apply.)
Public Key Infrastructure (PKI)
Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption
Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption