Missed Practice Test Questions Exams 11-15 Flashcards

1
Q

What command in Linux can be used to display help information related to a specific command-line command/utility?

A

man [command name]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Linux command-line utility provides a functionality similar to Windows Task Manager?

A

top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the characteristic features of SMB/CIFS?

A

Used mainly by computers running Windows, providing shared access to files, directories, and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Samba?

A

Protocol used by Windows to bridge the gap to Linux to transfer files, access network shares, or print to a network printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What refers to a solution that facilitates the enforcement of mobile device policies and procedures?

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Windows domain environment, the term “Home Folder” refers to a directory on a local PC where users can back up their data and files.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which encryption scheme is used in WiFi Protected Access 2 (WPA2)?

A

AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of

A

AES-CCMP, AES-GCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of TACACS+?

A

Encrypts the entire payload of the access-request packet, separates authentication and authorization, primarily used for device administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of RADIUS?

A

Primarily used for network access, combines authentication and authorization, encrypts only the password in the access-request packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of an XSS attack?

A

Exploits the trust a user’s browser has in a website, a malicious script is injected into a trusted website, user’s browser executes attacker’s script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What sign-in options in Windows 10 rely on knowledge-based authentication factors?

A

Username, PIN, password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as

A

Windows update

17
Q

What sign-in options in Windows 10 rely on inherence-based authentication factors?

A

Fingerprint, facial recognition

18
Q

How are NTFS permissions used?

A

Apply to both network and local users, on folders or individual files

19
Q

What is the correct hierarchy of precedence for permissions settings in NTFS?

A

Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow

20
Q

What is the correct syntax for applying the read-only attribute to a file?

A

attrib +R [drive:] [path] [filename]

21
Q

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.

A

False

22
Q

In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.

A

False

23
Q

An account policy setting that forces users to produce a new password every time they are required to change their old password is known as:

A

Password history