ログイン

EC: C2 Deep Pt.3

EC: C2 Deep Pt.3
94問 • 1年前
  • Mixtapes øf Hanna
  • 通報

    問題一覧

  • 1

    Which of the statements listed below describe the characteristic features of open-source applications and OSs? (Select 2 answers)

    Permission to modify and redistribute the application, Free access to the application code

  • 2

    Which of the following are not examples of proprietary software? (Select all that apply)

    Linux, Android

  • 3

    Which of the answers listed below refer(s) to the characteristics of macOS? (Select all that apply)

    Developed by Apple, Designed for laptops, Designed for desktops

  • 4

    What is the name of a lightweight operating system designed by Google for small-factor PCs, laptops, tablets, and mobile devices?

    Chrome OS

  • 5

    Which of the following answers refers to an OS that uses web browser as its main user interface?

    Chrome OS

  • 6

    Which of the answers listed below refer to the characteristics of iPadOS? (Select 2 answers)

    Developed by Apple, Designed for tablets

  • 7

    An Apple-proprietary OS designed for tablets, smartphones and mobile devices is called:

    iOS

  • 8

    Which of the following answers refers to an open-source mobile OS designed by Google for smartphones and tablets?

    Android

  • 9

    Examples of workstation OSs include: (Select 4 Answers)

    macOS, Windows, Linux, Chrome OS

  • 10

     Which of the answers listed below refer to OSs used in smartphones and tablets? (Select 3 answers)

    iOS, Android, iPadOS

  • 11

    Which of the following answers refer(s) to (a) file system type(s) specific to Microsoft Windows OSs? (Select all that apply)

    NTFS, FAT32, exFAT

  • 12

    The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

    FAT32

  • 13

    The advantages of the NTFS over FAT32 file system include:

    All of the above features are improvements implemented in NTFS not available in FAT32

  • 14

    ext3 and ext4 are examples of default file systems used by:

    Linux distributions

  • 15

    Which of the answers listed below refers to a file system developed by Apple for its operating systems?

    APFS

  • 16

    A Microsoft-proprietary file system optimized for flash drives is known as:

    exFAT

  • 17

    Which of the following terms refers to a product/service that no longer receives continuing support?

    EOL

  • 18

    An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type.

    True

  • 19

    All modern applications are designed as cross-platform software which allows them to be run on different operating systems (e.g., Windows, Linux, or macOS) without any modifications in the application source code.

    False

  • 20

    Which of the OS boot methods listed below takes advantage of a network interface?

    PXE

  • 21

    Match an OS boot method on the left with the corresponding media type from the drop-down list. | Optical disc | External drive | Flash drive | Network boot | Internal fixed disk | Internal hard drive |

    CD-ROM/DVD/Blu-ray | eSATA | USB | PXE | HDD/SSD | Partition

  • 22

    What is the name of an operating system installation type that preserves system settings, personal files, and applications from the older OS version?

    In-place upgrade

  • 23

    Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?

    Recovery partition

  • 24

    A type of Windows installation that erases the entire contents of a target partition is called:

    Clean install

  • 25

    Which of the installation types listed below provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings?

    Image deployment

  • 26

    Windows repair installation: (Select 3 answers)

    Does not affect user applications, Preserves application configuration settings, Does not affect user files

  • 27

    Which of the following enable installation of an OS via network interface? (Select 2 answers)

    Netboot, PXE

  • 28

    TrueDevices that are not detected during the operating system installation process might require loading alternate third-party drivers.

    True

  • 29

    Which of the sources listed below allow for obtaining, installing, and updating device drivers used by Microsoft Windows OSs? (Select 3 answers)

    Windows Update, Device manufacturer, Windows Device Manager utility

  • 30

    What are the advantages of organizing hard drive space into multiple partitions? (Select 3 answers)

    Multiboot environment, Separated disk space used for virtual memory, Separation of user files from the operating system and application files

  • 31

    Which of the following answers refers to a unique string of characters used to identify hardware, software, and data?

    GUID

  • 32

    Which of the answers listed below describe the characteristics of the MBR partition style? (Select 3 answers)

    Legacy BIOS, Maximum disk size limit of 2 TB, Overall number of partitions limited to 4

  • 33

    Which of the following answers refer to GPT? (Select 3 answers)

    Support for disks larger than 2 TB, Up 128 primary partitions, UEFI BIOS

  • 34

    In GPT disk architecture, each partition is labeled with a unique identifier known as GUID.

    True

  • 35

    Quick format: (Select 3 answers)

    Does not erase data, Does not check the drive for bad sectors, Requires less time than full format

  • 36

    Full format: (Select 3 answers)

    Erases all data to prevent its recovery, Requires more time than quick format, Checks the drive for bad sectors

  • 37

    A list of computer hardware proven to be compatible with a particular OS is referred to as:

    HCL

  • 38

    Which of the answers listed below refers to a file extension used in macOS for a file that contains an exact copy of the contents of a storage device?

    .dmg

  • 39

    Which of the following answers refers to a macOS application installer file?

    .pkg

  • 40

    Which location in macOS provides access to application updates menu?

    App Store

  • 41

    An application in macOS can be executed by double-clicking on an icon with .app file extension. The icon with the .app extension also points to a directory (a.k.a. application bundle) that contains all the files necessary to run the application. Contents of the directory can be examined by right-clicking on the application's icon and selecting Show Package Contents from the context menu. The process of uninstalling macOS applications that store all files in one place is simplified and relies on moving the program icon to the system recycle bin (called Trash).

    True

  • 42

    Which of the answers listed below refers to an SSO solution for all Apple's products and services?

    Apple ID

  • 43

    Managed Apple ID is an account management solution that allows system administrators to disable certain features of Apple devices used by employees in a business environment.

    True

  • 44

    Which of the following macOS features allows to create switchable desktop environments?

    Spaces

  • 45

    Time Machine is a built-in backup utility for:

    macOS

  • 46

    A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as:

    Mission Control

  • 47

    Which of the following answers refers to a macOS password management system?

    Keychain

  • 48

    Which of the answers listed below refers to a macOS system search utility?

    Spotlight

  • 49

    A service that enables storage of data on Apple cloud servers is called:

    iCloud

  • 50

    Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers)

    Apple menu > System Preferences... > Mouse, Apple menu > System Preferences... > Trackpad

  • 51

    Which of the answers listed below refers to a macOS file manager application?

    Finder

  • 52

    Which of the macOS features enables access to optical drive of another computer over a network?

    Remote Disc

  • 53

    What is the name of a macOS equivalent of Windows Taskbar?

    Dock

  • 54

    Which of the following is a macOS disk maintenance tool?

    Disk Utility

  • 55

    Which of the answers listed below refers to a disk encryption utility in macOS?

    FileVault

  • 56

    Which of the following system utilities in macOS provides access to different command-line shells?

    Terminal

  • 57

    An unresponsive application/process in macOS can be terminated with the use of:

    Force Quit

  • 58

    Which Linux command allows to display information about files and directories contained within the current working directory?

    ls

  • 59

    A Linux command displaying an absolute path to (i.e., full filename of) the current working directory is called:

    pwd

  • 60

    Which Linux command-line command is used for transferring files/directories to a different directory?

    mv

  • 61

    What is the name of the Linux command used for renaming files and directories?

    mv

  • 62

    Which of the Linux commands listed below allows for copying files and directories?

    cp

  • 63

    A command-line command in Linux used for deleting files and directories is known as:

    rm

  • 64

    What is the function of the Linux chmod command?

    Changes file access permissions

  • 65

    What is the function of the Linux chown command?

    Changes file owner and group permissions

  • 66

    Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

    su

  • 67

    A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

    sudo

  • 68

    What is the name of a command-line utility used for managing (i.e., finding, installing, or updating) software packages on Debian and Debian-based Linux distributions?

    apt-get

  • 69

    Which of the answers listed below refers to a package management utility used on Red Hat and Red Hat-based Linux distributions?

    yum

  • 70

    Which of the following answers refers to a Linux command-line utility used for configuring network interfaces?

    ip

  • 71

    Which of the Linux commands listed below can be used to display the amount of available disk space?

    df

  • 72

    A Linux command-line command that enables searching files for lines containing a match to a given text pattern is known as:

    grep

  • 73

    What is the name of a Linux command-line utility used for displaying a snapshot of running processes?

    ps

  • 74

    Which of the following commands in Linux can be used to display help information related to a specific command-line command/utility?

    man [command name]

  • 75

    Which Linux command-line utility provides a functionality similar to Windows Task Manager?

    top

  • 76

    Which of the Linux utilities listed below can be used to display real-time system resources utilization statistics?

    top

  • 77

    A Linux command-line utility used to search for files and directories is called:

    find

  • 78

    Which of the following answers refers to a Linux network administration command-line utility used for DNS queries?

    dig

  • 79

    A Linux command that allows to create, view, and concatenate files is known as:

    cat

  • 80

    Which of the answers listed below refers to a Linux command-line text editor?

    nano

  • 81

    Which of the following Linux utilities can be used for creating backups?

    All of the above

  • 82

    An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

    True

  • 83

    Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply)

    RFID badge, Key fob, Smart card

  • 84

    In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

    True

  • 85

    Examples of biometric devices include: (Select 3 Answers)

    Retina scanner, Fingerprint scanner, Palmprint scanner

  • 86

    In the context of physical security, a magnetometer is a device used for detecting metal objects.

    True

  • 87

    A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.

    True

  • 88

    Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

    ACL

  • 89

    A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:

    ACL

  • 90

    Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). The categories of authentication attributes include geolocation ("somewhere you are"), user-specific activity patterns, such as keyboard typing style ("something you can do"), revealing something about an individual, e.g., wearing an ID badge ("something you exhibit"), or proving the relation with a trusted third party ("someone you know"). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.

    True

  • 91

    Which of the examples listed below meets the requirement of multifactor authentication?

    Password and biometric scan

  • 92

    Which of the following is an example of a soft authentication token?

    Authenticator app

  • 93

    Which type of software enables a centralized administration of mobile devices?

    MDM

  • 94

    Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures?

    MDM

  • DION#1

    DION#1

    Mixtapes øf Hanna · 90問 · 1年前

    DION#1

    DION#1

    90問 • 1年前
    Mixtapes øf Hanna

    DION#2

    DION#2

    Mixtapes øf Hanna · 90問 · 1年前

    DION#2

    DION#2

    90問 • 1年前
    Mixtapes øf Hanna

    DION#3

    DION#3

    Mixtapes øf Hanna · 90問 · 1年前

    DION#3

    DION#3

    90問 • 1年前
    Mixtapes øf Hanna

    DION#4

    DION#4

    Mixtapes øf Hanna · 90問 · 1年前

    DION#4

    DION#4

    90問 • 1年前
    Mixtapes øf Hanna

    DION#5

    DION#5

    Mixtapes øf Hanna · 89問 · 1年前

    DION#5

    DION#5

    89問 • 1年前
    Mixtapes øf Hanna

    DION#6

    DION#6

    Mixtapes øf Hanna · 87問 · 1年前

    DION#6

    DION#6

    87問 • 1年前
    Mixtapes øf Hanna

    ID: PT.1 COLLABORATE

    ID: PT.1 COLLABORATE

    Mixtapes øf Hanna · 95問 · 1年前

    ID: PT.1 COLLABORATE

    ID: PT.1 COLLABORATE

    95問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.1

    ID: C2 Deep Pt.1

    Mixtapes øf Hanna · 90問 · 1年前

    ID: C2 Deep Pt.1

    ID: C2 Deep Pt.1

    90問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.2

    ID: C2 Deep Pt.2

    Mixtapes øf Hanna · 98問 · 1年前

    ID: C2 Deep Pt.2

    ID: C2 Deep Pt.2

    98問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.3

    ID: C2 Deep Pt.3

    Mixtapes øf Hanna · 93問 · 1年前

    ID: C2 Deep Pt.3

    ID: C2 Deep Pt.3

    93問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.4

    ID: C2 Deep Pt.4

    Mixtapes øf Hanna · 85問 · 1年前

    ID: C2 Deep Pt.4

    ID: C2 Deep Pt.4

    85問 • 1年前
    Mixtapes øf Hanna

    OL BOYS STUDY GUIDE

    OL BOYS STUDY GUIDE

    Mixtapes øf Hanna · 70問 · 1年前

    OL BOYS STUDY GUIDE

    OL BOYS STUDY GUIDE

    70問 • 1年前
    Mixtapes øf Hanna

    MASTER REVIEW

    MASTER REVIEW

    Mixtapes øf Hanna · 44問 · 1年前

    MASTER REVIEW

    MASTER REVIEW

    44問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep PT.1

    EC: C2 Deep PT.1

    Mixtapes øf Hanna · 96問 · 1年前

    EC: C2 Deep PT.1

    EC: C2 Deep PT.1

    96問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep PT.2

    EC: C2 Deep PT.2

    Mixtapes øf Hanna · 89問 · 1年前

    EC: C2 Deep PT.2

    EC: C2 Deep PT.2

    89問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep Pt.4

    EC: C2 Deep Pt.4

    Mixtapes øf Hanna · 91問 · 1年前

    EC: C2 Deep Pt.4

    EC: C2 Deep Pt.4

    91問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep Pt.5

    EC: C2 Deep Pt.5

    Mixtapes øf Hanna · 88問 · 1年前

    EC: C2 Deep Pt.5

    EC: C2 Deep Pt.5

    88問 • 1年前
    Mixtapes øf Hanna

    問題一覧

  • 1

    Which of the statements listed below describe the characteristic features of open-source applications and OSs? (Select 2 answers)

    Permission to modify and redistribute the application, Free access to the application code

  • 2

    Which of the following are not examples of proprietary software? (Select all that apply)

    Linux, Android

  • 3

    Which of the answers listed below refer(s) to the characteristics of macOS? (Select all that apply)

    Developed by Apple, Designed for laptops, Designed for desktops

  • 4

    What is the name of a lightweight operating system designed by Google for small-factor PCs, laptops, tablets, and mobile devices?

    Chrome OS

  • 5

    Which of the following answers refers to an OS that uses web browser as its main user interface?

    Chrome OS

  • 6

    Which of the answers listed below refer to the characteristics of iPadOS? (Select 2 answers)

    Developed by Apple, Designed for tablets

  • 7

    An Apple-proprietary OS designed for tablets, smartphones and mobile devices is called:

    iOS

  • 8

    Which of the following answers refers to an open-source mobile OS designed by Google for smartphones and tablets?

    Android

  • 9

    Examples of workstation OSs include: (Select 4 Answers)

    macOS, Windows, Linux, Chrome OS

  • 10

     Which of the answers listed below refer to OSs used in smartphones and tablets? (Select 3 answers)

    iOS, Android, iPadOS

  • 11

    Which of the following answers refer(s) to (a) file system type(s) specific to Microsoft Windows OSs? (Select all that apply)

    NTFS, FAT32, exFAT

  • 12

    The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

    FAT32

  • 13

    The advantages of the NTFS over FAT32 file system include:

    All of the above features are improvements implemented in NTFS not available in FAT32

  • 14

    ext3 and ext4 are examples of default file systems used by:

    Linux distributions

  • 15

    Which of the answers listed below refers to a file system developed by Apple for its operating systems?

    APFS

  • 16

    A Microsoft-proprietary file system optimized for flash drives is known as:

    exFAT

  • 17

    Which of the following terms refers to a product/service that no longer receives continuing support?

    EOL

  • 18

    An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type.

    True

  • 19

    All modern applications are designed as cross-platform software which allows them to be run on different operating systems (e.g., Windows, Linux, or macOS) without any modifications in the application source code.

    False

  • 20

    Which of the OS boot methods listed below takes advantage of a network interface?

    PXE

  • 21

    Match an OS boot method on the left with the corresponding media type from the drop-down list. | Optical disc | External drive | Flash drive | Network boot | Internal fixed disk | Internal hard drive |

    CD-ROM/DVD/Blu-ray | eSATA | USB | PXE | HDD/SSD | Partition

  • 22

    What is the name of an operating system installation type that preserves system settings, personal files, and applications from the older OS version?

    In-place upgrade

  • 23

    Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?

    Recovery partition

  • 24

    A type of Windows installation that erases the entire contents of a target partition is called:

    Clean install

  • 25

    Which of the installation types listed below provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings?

    Image deployment

  • 26

    Windows repair installation: (Select 3 answers)

    Does not affect user applications, Preserves application configuration settings, Does not affect user files

  • 27

    Which of the following enable installation of an OS via network interface? (Select 2 answers)

    Netboot, PXE

  • 28

    TrueDevices that are not detected during the operating system installation process might require loading alternate third-party drivers.

    True

  • 29

    Which of the sources listed below allow for obtaining, installing, and updating device drivers used by Microsoft Windows OSs? (Select 3 answers)

    Windows Update, Device manufacturer, Windows Device Manager utility

  • 30

    What are the advantages of organizing hard drive space into multiple partitions? (Select 3 answers)

    Multiboot environment, Separated disk space used for virtual memory, Separation of user files from the operating system and application files

  • 31

    Which of the following answers refers to a unique string of characters used to identify hardware, software, and data?

    GUID

  • 32

    Which of the answers listed below describe the characteristics of the MBR partition style? (Select 3 answers)

    Legacy BIOS, Maximum disk size limit of 2 TB, Overall number of partitions limited to 4

  • 33

    Which of the following answers refer to GPT? (Select 3 answers)

    Support for disks larger than 2 TB, Up 128 primary partitions, UEFI BIOS

  • 34

    In GPT disk architecture, each partition is labeled with a unique identifier known as GUID.

    True

  • 35

    Quick format: (Select 3 answers)

    Does not erase data, Does not check the drive for bad sectors, Requires less time than full format

  • 36

    Full format: (Select 3 answers)

    Erases all data to prevent its recovery, Requires more time than quick format, Checks the drive for bad sectors

  • 37

    A list of computer hardware proven to be compatible with a particular OS is referred to as:

    HCL

  • 38

    Which of the answers listed below refers to a file extension used in macOS for a file that contains an exact copy of the contents of a storage device?

    .dmg

  • 39

    Which of the following answers refers to a macOS application installer file?

    .pkg

  • 40

    Which location in macOS provides access to application updates menu?

    App Store

  • 41

    An application in macOS can be executed by double-clicking on an icon with .app file extension. The icon with the .app extension also points to a directory (a.k.a. application bundle) that contains all the files necessary to run the application. Contents of the directory can be examined by right-clicking on the application's icon and selecting Show Package Contents from the context menu. The process of uninstalling macOS applications that store all files in one place is simplified and relies on moving the program icon to the system recycle bin (called Trash).

    True

  • 42

    Which of the answers listed below refers to an SSO solution for all Apple's products and services?

    Apple ID

  • 43

    Managed Apple ID is an account management solution that allows system administrators to disable certain features of Apple devices used by employees in a business environment.

    True

  • 44

    Which of the following macOS features allows to create switchable desktop environments?

    Spaces

  • 45

    Time Machine is a built-in backup utility for:

    macOS

  • 46

    A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as:

    Mission Control

  • 47

    Which of the following answers refers to a macOS password management system?

    Keychain

  • 48

    Which of the answers listed below refers to a macOS system search utility?

    Spotlight

  • 49

    A service that enables storage of data on Apple cloud servers is called:

    iCloud

  • 50

    Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers)

    Apple menu > System Preferences... > Mouse, Apple menu > System Preferences... > Trackpad

  • 51

    Which of the answers listed below refers to a macOS file manager application?

    Finder

  • 52

    Which of the macOS features enables access to optical drive of another computer over a network?

    Remote Disc

  • 53

    What is the name of a macOS equivalent of Windows Taskbar?

    Dock

  • 54

    Which of the following is a macOS disk maintenance tool?

    Disk Utility

  • 55

    Which of the answers listed below refers to a disk encryption utility in macOS?

    FileVault

  • 56

    Which of the following system utilities in macOS provides access to different command-line shells?

    Terminal

  • 57

    An unresponsive application/process in macOS can be terminated with the use of:

    Force Quit

  • 58

    Which Linux command allows to display information about files and directories contained within the current working directory?

    ls

  • 59

    A Linux command displaying an absolute path to (i.e., full filename of) the current working directory is called:

    pwd

  • 60

    Which Linux command-line command is used for transferring files/directories to a different directory?

    mv

  • 61

    What is the name of the Linux command used for renaming files and directories?

    mv

  • 62

    Which of the Linux commands listed below allows for copying files and directories?

    cp

  • 63

    A command-line command in Linux used for deleting files and directories is known as:

    rm

  • 64

    What is the function of the Linux chmod command?

    Changes file access permissions

  • 65

    What is the function of the Linux chown command?

    Changes file owner and group permissions

  • 66

    Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

    su

  • 67

    A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

    sudo

  • 68

    What is the name of a command-line utility used for managing (i.e., finding, installing, or updating) software packages on Debian and Debian-based Linux distributions?

    apt-get

  • 69

    Which of the answers listed below refers to a package management utility used on Red Hat and Red Hat-based Linux distributions?

    yum

  • 70

    Which of the following answers refers to a Linux command-line utility used for configuring network interfaces?

    ip

  • 71

    Which of the Linux commands listed below can be used to display the amount of available disk space?

    df

  • 72

    A Linux command-line command that enables searching files for lines containing a match to a given text pattern is known as:

    grep

  • 73

    What is the name of a Linux command-line utility used for displaying a snapshot of running processes?

    ps

  • 74

    Which of the following commands in Linux can be used to display help information related to a specific command-line command/utility?

    man [command name]

  • 75

    Which Linux command-line utility provides a functionality similar to Windows Task Manager?

    top

  • 76

    Which of the Linux utilities listed below can be used to display real-time system resources utilization statistics?

    top

  • 77

    A Linux command-line utility used to search for files and directories is called:

    find

  • 78

    Which of the following answers refers to a Linux network administration command-line utility used for DNS queries?

    dig

  • 79

    A Linux command that allows to create, view, and concatenate files is known as:

    cat

  • 80

    Which of the answers listed below refers to a Linux command-line text editor?

    nano

  • 81

    Which of the following Linux utilities can be used for creating backups?

    All of the above

  • 82

    An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

    True

  • 83

    Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply)

    RFID badge, Key fob, Smart card

  • 84

    In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

    True

  • 85

    Examples of biometric devices include: (Select 3 Answers)

    Retina scanner, Fingerprint scanner, Palmprint scanner

  • 86

    In the context of physical security, a magnetometer is a device used for detecting metal objects.

    True

  • 87

    A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.

    True

  • 88

    Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

    ACL

  • 89

    A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:

    ACL

  • 90

    Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). The categories of authentication attributes include geolocation ("somewhere you are"), user-specific activity patterns, such as keyboard typing style ("something you can do"), revealing something about an individual, e.g., wearing an ID badge ("something you exhibit"), or proving the relation with a trusted third party ("someone you know"). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.

    True

  • 91

    Which of the examples listed below meets the requirement of multifactor authentication?

    Password and biometric scan

  • 92

    Which of the following is an example of a soft authentication token?

    Authenticator app

  • 93

    Which type of software enables a centralized administration of mobile devices?

    MDM

  • 94

    Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures?

    MDM