Missed Practice Test Questions Exams 11-15 Flashcards
What command in Linux can be used to display help information related to a specific command-line command/utility?
man [command name]
What Linux command-line utility provides a functionality similar to Windows Task Manager?
top
What are the characteristic features of SMB/CIFS?
Used mainly by computers running Windows, providing shared access to files, directories, and devices
What is Samba?
Protocol used by Windows to bridge the gap to Linux to transfer files, access network shares, or print to a network printer
What refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
What refers to a solution that facilitates the enforcement of mobile device policies and procedures?
MDM
In Windows domain environment, the term “Home Folder” refers to a directory on a local PC where users can back up their data and files.
False
Which encryption scheme is used in WiFi Protected Access 2 (WPA2)?
AES-CCMP
For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of
AES-CCMP, AES-GCMP
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet, separates authentication and authorization, primarily used for device administration
What are the characteristics of RADIUS?
Primarily used for network access, combines authentication and authorization, encrypts only the password in the access-request packet
Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of
Kerberos
What are the characteristics of an XSS attack?
Exploits the trust a user’s browser has in a website, a malicious script is injected into a trusted website, user’s browser executes attacker’s script
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.
True
What sign-in options in Windows 10 rely on knowledge-based authentication factors?
Username, PIN, password
A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as
Windows update
What sign-in options in Windows 10 rely on inherence-based authentication factors?
Fingerprint, facial recognition
How are NTFS permissions used?
Apply to both network and local users, on folders or individual files
What is the correct hierarchy of precedence for permissions settings in NTFS?
Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow
What is the correct syntax for applying the read-only attribute to a file?
attrib +R [drive:] [path] [filename]
In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.
False
In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.
False
An account policy setting that forces users to produce a new password every time they are required to change their old password is known as:
Password history