Missed Practice Test Questions Exams 11-15 Flashcards
What command in Linux can be used to display help information related to a specific command-line command/utility?
man [command name]
What Linux command-line utility provides a functionality similar to Windows Task Manager?
top
What are the characteristic features of SMB/CIFS?
Used mainly by computers running Windows, providing shared access to files, directories, and devices
What is Samba?
Protocol used by Windows to bridge the gap to Linux to transfer files, access network shares, or print to a network printer
What refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
What refers to a solution that facilitates the enforcement of mobile device policies and procedures?
MDM
In Windows domain environment, the term “Home Folder” refers to a directory on a local PC where users can back up their data and files.
False
Which encryption scheme is used in WiFi Protected Access 2 (WPA2)?
AES-CCMP
For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of
AES-CCMP, AES-GCMP
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet, separates authentication and authorization, primarily used for device administration
What are the characteristics of RADIUS?
Primarily used for network access, combines authentication and authorization, encrypts only the password in the access-request packet
Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of
Kerberos
What are the characteristics of an XSS attack?
Exploits the trust a user’s browser has in a website, a malicious script is injected into a trusted website, user’s browser executes attacker’s script
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.
True
What sign-in options in Windows 10 rely on knowledge-based authentication factors?
Username, PIN, password