IT APPLITCATIONS 10: USING SUPPORT AND SCRIPTING TOOLS Flashcards
Creating full backups with lower data transfer requirements
Synthetic
When the administrator installed software, they must accept what license?
EULA (End-user License Agreement)
Larger organizations will provide a dedicated what as a single point of contact so that a security incident can be reported through the proper channels?
CSIRT (Computer Security Incident Response Team)
A security engineer wants to learn how to code in Python but is running a Windows box. Which of the following is the easiest interpreter to set up for Windows?
CPython
A user experiences issues with their computer and has asked someone to remote desktop onto their computer to help resolve the issue. Unfortunately, the firewall only allows port 443 traffic. What should they use for assistance?
Quick Assist
A Linux administrator is looking at the bash history and sees the command chmod u+x file.sh. What was trying to be done with this command?
Set Permissions
What’s the 3-2-1 rule?
Three Copies, 2 Media Types, 1 off-side copy
Security analyst working on a monitoring team wants to implement new monitoring mechanisms around Secure Shell (SSH) authentication, what do they focus on?
Monitor for compromised keys.
What performs drive mapping in a Windows-only concept?
net use
Allows devices to be remotely powered on over a network
WOL
Principally designed for use by managed service providers?
RMM (Remote Monitoring and Management)
A server administrator is setting up a backup program for the servers to ensure recovery. Which of the following are the two main principles of backing up?
Frequency & Retention
A user is reviewing a script and comes across the code in one of the lines #until ping -c1 “$1” &>/dev/null. What is the line doing?
Nothing is executing.
A soldier at a government facility accidentally typed up a report on the wrong system and needs to ensure that the file is not recoverable. What should be done?
Perform a secure erase
A Windows administrator is combing through server logs and sees that a wscript.exe executed a script. What type of script is executed by default?
.VBS
Threat actor’s techniques is to perform a denial of service against the Remote Desktop Protocol (RDP) functionality in servers. What can the company enable to help prevent this?
NLA (Network Level Authentication)
A database administrator is scheduled for a meeting with the security team to discuss compliance with the PCI DSS standards. What type of information does it safeguard?
PINs
A security architect sets up a policy for the secure destruction of optical media. Which of the following is NOT an effective method?
Degaussing
A helpdesk operator normally works with Windows computers in the environment, but the company starts rolling out test Mac computers. The operator needs to connect to a user’s Mac. What tool would the operator likely use?
VNC (Virtual Network Computing)
A user accidentally deleted the presentation they were working on for an important upcoming meeting. Where should the user go for help?
File History