PBQs & Lab Qs Flashcards

1
Q

A special type of malware that hijacks system resources to mine cryptocurrencies. It is often linked to and performs over mass botnets.

A

Cryptominer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of malware that seeks to track user activity. Often paired with keylogger. Performs redirection to spoofed sites.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware that digs deep into firmware to try to be undetectable from the OS and the user. Attempts to escalate to the highest privileges. Infects firmware code.

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware packaged as a useful application. Used by attackers to conceal actions.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replication requires user interaction.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backup data type
All selected data regardless of when it was previously backed up.

A

Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup data type
All data modified since the last full backup Moderate/moderate

A

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backup data type
New files and files modified since last backup

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False? The xcopy command will copy specified files and directories.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of DHCP?

a) To create a secure internet gateway.
b) To route traffic outside of the network.
c) To provide IP addresses to devices.
d) To resolve hostnames to IP addresses.

A

c) To provide IP addresses to devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following tasks is MOST likely to be an optional rather than required consideration during physical installation of the wireless router?

a) Proximity to wired PC workstation
b) Proximity to building power socket
c) Proximity to ISP network port
d) Safe location to minimize risks from knocks and spills

A

a) Proximity to wired PC workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following wireless authentication methods would provide better security on a typical home network?

a) WPA2-SAE
b) WEP-SAE
c) WPA3-EAP
d) WEP-EAP
e) WPA3-SAE
f) WPA2-EAP

A

e. WPA3-SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When configuring a home web server, the destination port was set to 80. What specific type of configuration would have been achieved by setting the destination port to 8080?

a) Port mapping
b) Port triggering
c) UPnP
d) DMZ host

A

a. Port mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which password setting prevents a password from being re-used?

a) Lockout
b) Complexity
c) Age
d) History

A

d) History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it important to test that security changes work as expected?

a) Windows has poor security
b) It’s easy to make a mistake
c) Policy settings are glitchy
d) Changes to security take effect after testing

A

b) It’s easy to make a mistake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the name of the tool used to enforce security settings on a Windows computer?

a) Local Security Protector
b) Local Security Policy
c) Local Security Setting
d) Local Security Defender

A

b) Local Security Policy

17
Q

What is the default minimum password length allowed by Windows?

a) 8
b) 10
c) 0
d) 6

A

c) 0

18
Q

What is an eicar file?

a) An anti-virus testing tool
b) A scanner exclusion
c) A macro virus
d) A malicious virus

A

a) An anti-virus testing tool

19
Q

What is a path exclusion?

a) Defines a folder location to always scan
b) Defines a file to always scan
c) Defines a file to never scan
d) Defines a folder location to never scan

A

d) Defines a folder location to never scan

20
Q

Which of the following best describes group policy?

a) File and folder permissions
b) An administrative tool for updating anti-virus
c) A special type of anti-virus
d) An administrative tool for enforcing settings

A

d) An administrative tool for enforcing settings

21
Q

What is the command to force a refresh of group policies?

a) updatepolicy /now
b) updpolicy /now
c) grouppol /force
d) gpupdate /force

A

d) gpupdate /force

22
Q

Which of the following tools can be used to remotely access a Linux computer?

a) WMI
b) SSH
c) ADUC
d) Get-RemoteAccess

A

b) SSH

23
Q

True or False. Remote Desktop Connections can only be established using Windows computers.

A

False.

24
Q

Which of the following commands could be used to install the secure shell server service on Ubuntu?

a) ssh install sudo apt
b) sudo install ssh apt
c) sudo apt install ssh
d) install ssh sudo apt

A

c) sudo apt install ssh

25
Q

True or false. Manual backups are more reliable than automatic backups.

A

False.

26
Q

Which of the following is the best reason to back up to an external drive?

a) It uses less memory
b) Files can only be compressed on external drives
c) Can be used if primary computer disk fails
d) It is faster than the main drive

A

c) Can be used if primary computer disk fails

27
Q

True or False. Backups are not needed if data is stored in the cloud.

A

False.

28
Q

ISE

A

Integrated Scripting Environment

29
Q

Which character must be prefixed to a name to declare a variable in PowerShell?

a) $
b) #
c) \
d) *

A

a) $

30
Q

df command retrieves what?

A

Drive Information

31
Q

Which two commands are used to write output to the terminal? (2)

a) printf
b) hello.sh
c) echo
d) touch
e) \n

A

a) printf & c) echo

32
Q

What type of code structure uses criteria to determine which statements are executed?

a) Conditional
b) Loop
c) Comparator
d) Variable

A

a) Conditional

33
Q

What type of variable is available to all scripts?

a) Array
b) Profile
c) Environment
d) Bash

A

c) Environment