PBQs & Lab Qs Flashcards
A special type of malware that hijacks system resources to mine cryptocurrencies. It is often linked to and performs over mass botnets.
Cryptominer
A type of malware that seeks to track user activity. Often paired with keylogger. Performs redirection to spoofed sites.
Spyware
Malware that digs deep into firmware to try to be undetectable from the OS and the user. Attempts to escalate to the highest privileges. Infects firmware code.
rootkit
Malware packaged as a useful application. Used by attackers to conceal actions.
Trojan
Replication requires user interaction.
Viruses
Backup data type
All selected data regardless of when it was previously backed up.
Full
Backup data type
All data modified since the last full backup Moderate/moderate
Differential
Backup data type
New files and files modified since last backup
Incremental
True or False? The xcopy command will copy specified files and directories.
True
What is the purpose of DHCP?
a) To create a secure internet gateway.
b) To route traffic outside of the network.
c) To provide IP addresses to devices.
d) To resolve hostnames to IP addresses.
c) To provide IP addresses to devices.
Which of the following tasks is MOST likely to be an optional rather than required consideration during physical installation of the wireless router?
a) Proximity to wired PC workstation
b) Proximity to building power socket
c) Proximity to ISP network port
d) Safe location to minimize risks from knocks and spills
a) Proximity to wired PC workstation
Which of the following wireless authentication methods would provide better security on a typical home network?
a) WPA2-SAE
b) WEP-SAE
c) WPA3-EAP
d) WEP-EAP
e) WPA3-SAE
f) WPA2-EAP
e. WPA3-SAE
When configuring a home web server, the destination port was set to 80. What specific type of configuration would have been achieved by setting the destination port to 8080?
a) Port mapping
b) Port triggering
c) UPnP
d) DMZ host
a. Port mapping
Which password setting prevents a password from being re-used?
a) Lockout
b) Complexity
c) Age
d) History
d) History
Why is it important to test that security changes work as expected?
a) Windows has poor security
b) It’s easy to make a mistake
c) Policy settings are glitchy
d) Changes to security take effect after testing
b) It’s easy to make a mistake
What is the name of the tool used to enforce security settings on a Windows computer?
a) Local Security Protector
b) Local Security Policy
c) Local Security Setting
d) Local Security Defender
b) Local Security Policy
What is the default minimum password length allowed by Windows?
a) 8
b) 10
c) 0
d) 6
c) 0
What is an eicar file?
a) An anti-virus testing tool
b) A scanner exclusion
c) A macro virus
d) A malicious virus
a) An anti-virus testing tool
What is a path exclusion?
a) Defines a folder location to always scan
b) Defines a file to always scan
c) Defines a file to never scan
d) Defines a folder location to never scan
d) Defines a folder location to never scan
Which of the following best describes group policy?
a) File and folder permissions
b) An administrative tool for updating anti-virus
c) A special type of anti-virus
d) An administrative tool for enforcing settings
d) An administrative tool for enforcing settings
What is the command to force a refresh of group policies?
a) updatepolicy /now
b) updpolicy /now
c) grouppol /force
d) gpupdate /force
d) gpupdate /force
Which of the following tools can be used to remotely access a Linux computer?
a) WMI
b) SSH
c) ADUC
d) Get-RemoteAccess
b) SSH
True or False. Remote Desktop Connections can only be established using Windows computers.
False.
Which of the following commands could be used to install the secure shell server service on Ubuntu?
a) ssh install sudo apt
b) sudo install ssh apt
c) sudo apt install ssh
d) install ssh sudo apt
c) sudo apt install ssh
True or false. Manual backups are more reliable than automatic backups.
False.
Which of the following is the best reason to back up to an external drive?
a) It uses less memory
b) Files can only be compressed on external drives
c) Can be used if primary computer disk fails
d) It is faster than the main drive
c) Can be used if primary computer disk fails
True or False. Backups are not needed if data is stored in the cloud.
False.
ISE
Integrated Scripting Environment
Which character must be prefixed to a name to declare a variable in PowerShell?
a) $
b) #
c) \
d) *
a) $
df command retrieves what?
Drive Information
Which two commands are used to write output to the terminal? (2)
a) printf
b) hello.sh
c) echo
d) touch
e) \n
a) printf & c) echo
What type of code structure uses criteria to determine which statements are executed?
a) Conditional
b) Loop
c) Comparator
d) Variable
a) Conditional
What type of variable is available to all scripts?
a) Array
b) Profile
c) Environment
d) Bash
c) Environment