ID: PT.1 COLLABORATE
問題一覧
1
1 GHz processor, 1 GB of RAM, at least 16 GB of hard drive space
2
1 GHz processor, 2 GB of RAM, at least 20 GB of hard drive space
3
Dual-Core 1 GHZ processor, 4 GB of RAM, at least 64 GB of hard drive space
4
lists the files or directories in the current path on a Linux system.
5
displays the present working directory (current directory) path to the terminal or display.
6
used to check the file system and file system metadata of a volume for logical and physical errors.
7
a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.
8
System File Checker
9
Is
10
pwd
11
chkdsk
12
sfc
13
JavaScript
14
VBScript
15
Windows PowerShell
16
Shell Script
17
a scripting language that is designed to create interactive web-based content and web apps.
18
a scripting language based on Microsoft's Visual Basic programming language. Network administrators often use said script to perform repetitive administrative tasks.
19
enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting.
20
a file that contains a list of commands to be read and executed by the shell in Linux and macOS.
21
.js
22
.vbs
23
.ps1
24
.sh
25
Personally Identifiable Information
26
Payment Card Industry
27
General Data Protection Regulation
28
Protected Health Information
29
data used to identify, contact, or locate an individual. Information used: social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data.
30
organizations that process all types of payment cards, including credit cards, debit cards, ATM cards, and pre-paid cards.
31
governs how the personal data of individuals in the EU may be processed and transferred.
32
is any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment.
33
PCI (Payment Card Industry)
34
PII (Personally identifiable information)
35
GDPR (General Data Protection Regulation)
36
PHI (Protected Health Information)
37
a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it.
38
partitions that are only limited to only four primary partitions on a system using MBR.
39
a partition that can be divided into additional logical drives.
40
a subset of a computer's hardware resources, virtualized as a separate computer.
41
Primary Partition
42
Extended Partition
43
Swap Partition
44
Logical Partition
45
a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it.
46
partitions that are only limited to only four primary partitions on a system using MBR.
47
a partition that can be divided into additional logical drives.
48
a subset of a computer's hardware resources, virtualized as a separate computer.
49
Primary Partition
50
Extended Partition
51
Swap Partition
52
Logical Partition
53
4
54
2
55
1
56
R
57
W
58
X
59
rw-, 4 + 2 + 0 = 6
60
r-x, 4 + 0 + 1 = 5
61
r--, 4 + 0 + 0 = 4
62
read only
63
write
64
execute
65
uses a set number of tapes and overwrites the oldest tape with the newest information.
66
widely used to combine full and incremental backups to reduce backup time and enhance storage security.
67
an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.
68
backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media.
69
The FIFO Backup ( First In, First Out )
70
The grandfather-father-son (GFS)
71
3-2-1 Backup
72
The Tower of Hanoi
73
creates a copy of all the selected data regardless of when it was previously backed up.
74
creates a copy of the selected data that has been modified since the last full backup.
75
creates a copy of new files and files modified since the last full, incremental, or differential backup.
76
is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
77
Full Backup
78
Differential Backup
79
Incremental Backup
80
Synthetic Backup
81
7
82
Investigate and verify malware symptoms
83
Quarantine the infected systems
84
Disable System Restore in Windows
85
Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment)
86
Schedule scans and run updates
87
Enable System Restore and create a restore point in Windows
88
Educate the end user
89
1
90
2
91
3
92
4
93
5
94
6
95
7
DION#1
DION#1
Mixtapes øf Hanna · 90問 · 1年前DION#1
DION#1
90問 • 1年前DION#2
DION#2
Mixtapes øf Hanna · 90問 · 1年前DION#2
DION#2
90問 • 1年前DION#3
DION#3
Mixtapes øf Hanna · 90問 · 1年前DION#3
DION#3
90問 • 1年前DION#4
DION#4
Mixtapes øf Hanna · 90問 · 1年前DION#4
DION#4
90問 • 1年前DION#5
DION#5
Mixtapes øf Hanna · 89問 · 1年前DION#5
DION#5
89問 • 1年前DION#6
DION#6
Mixtapes øf Hanna · 87問 · 1年前DION#6
DION#6
87問 • 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
Mixtapes øf Hanna · 90問 · 1年前ID: C2 Deep Pt.1
ID: C2 Deep Pt.1
90問 • 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
Mixtapes øf Hanna · 98問 · 1年前ID: C2 Deep Pt.2
ID: C2 Deep Pt.2
98問 • 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
Mixtapes øf Hanna · 93問 · 1年前ID: C2 Deep Pt.3
ID: C2 Deep Pt.3
93問 • 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
Mixtapes øf Hanna · 85問 · 1年前ID: C2 Deep Pt.4
ID: C2 Deep Pt.4
85問 • 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
Mixtapes øf Hanna · 70問 · 1年前OL BOYS STUDY GUIDE
OL BOYS STUDY GUIDE
70問 • 1年前MASTER REVIEW
MASTER REVIEW
Mixtapes øf Hanna · 44問 · 1年前MASTER REVIEW
MASTER REVIEW
44問 • 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
Mixtapes øf Hanna · 96問 · 1年前EC: C2 Deep PT.1
EC: C2 Deep PT.1
96問 • 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
Mixtapes øf Hanna · 89問 · 1年前EC: C2 Deep PT.2
EC: C2 Deep PT.2
89問 • 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
Mixtapes øf Hanna · 94問 · 1年前EC: C2 Deep Pt.3
EC: C2 Deep Pt.3
94問 • 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
Mixtapes øf Hanna · 91問 · 1年前EC: C2 Deep Pt.4
EC: C2 Deep Pt.4
91問 • 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
Mixtapes øf Hanna · 88問 · 1年前EC: C2 Deep Pt.5
EC: C2 Deep Pt.5
88問 • 1年前問題一覧
1
1 GHz processor, 1 GB of RAM, at least 16 GB of hard drive space
2
1 GHz processor, 2 GB of RAM, at least 20 GB of hard drive space
3
Dual-Core 1 GHZ processor, 4 GB of RAM, at least 64 GB of hard drive space
4
lists the files or directories in the current path on a Linux system.
5
displays the present working directory (current directory) path to the terminal or display.
6
used to check the file system and file system metadata of a volume for logical and physical errors.
7
a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.
8
System File Checker
9
Is
10
pwd
11
chkdsk
12
sfc
13
JavaScript
14
VBScript
15
Windows PowerShell
16
Shell Script
17
a scripting language that is designed to create interactive web-based content and web apps.
18
a scripting language based on Microsoft's Visual Basic programming language. Network administrators often use said script to perform repetitive administrative tasks.
19
enables you to perform management and administrative tasks in Windows 7 and later. It is fully integrated with the operating system and supports both remote execution and scripting.
20
a file that contains a list of commands to be read and executed by the shell in Linux and macOS.
21
.js
22
.vbs
23
.ps1
24
.sh
25
Personally Identifiable Information
26
Payment Card Industry
27
General Data Protection Regulation
28
Protected Health Information
29
data used to identify, contact, or locate an individual. Information used: social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data.
30
organizations that process all types of payment cards, including credit cards, debit cards, ATM cards, and pre-paid cards.
31
governs how the personal data of individuals in the EU may be processed and transferred.
32
is any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment.
33
PCI (Payment Card Industry)
34
PII (Personally identifiable information)
35
GDPR (General Data Protection Regulation)
36
PHI (Protected Health Information)
37
a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it.
38
partitions that are only limited to only four primary partitions on a system using MBR.
39
a partition that can be divided into additional logical drives.
40
a subset of a computer's hardware resources, virtualized as a separate computer.
41
Primary Partition
42
Extended Partition
43
Swap Partition
44
Logical Partition
45
a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it.
46
partitions that are only limited to only four primary partitions on a system using MBR.
47
a partition that can be divided into additional logical drives.
48
a subset of a computer's hardware resources, virtualized as a separate computer.
49
Primary Partition
50
Extended Partition
51
Swap Partition
52
Logical Partition
53
4
54
2
55
1
56
R
57
W
58
X
59
rw-, 4 + 2 + 0 = 6
60
r-x, 4 + 0 + 1 = 5
61
r--, 4 + 0 + 0 = 4
62
read only
63
write
64
execute
65
uses a set number of tapes and overwrites the oldest tape with the newest information.
66
widely used to combine full and incremental backups to reduce backup time and enhance storage security.
67
an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.
68
backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media.
69
The FIFO Backup ( First In, First Out )
70
The grandfather-father-son (GFS)
71
3-2-1 Backup
72
The Tower of Hanoi
73
creates a copy of all the selected data regardless of when it was previously backed up.
74
creates a copy of the selected data that has been modified since the last full backup.
75
creates a copy of new files and files modified since the last full, incremental, or differential backup.
76
is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
77
Full Backup
78
Differential Backup
79
Incremental Backup
80
Synthetic Backup
81
7
82
Investigate and verify malware symptoms
83
Quarantine the infected systems
84
Disable System Restore in Windows
85
Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment)
86
Schedule scans and run updates
87
Enable System Restore and create a restore point in Windows
88
Educate the end user
89
1
90
2
91
3
92
4
93
5
94
6
95
7