- Which method can be used to harden a computing device?
- Allow USB auto-detection.
- Force periodic password changes. *
- Allow default services to remain enabled.
- Update patches on a strict annual basis irrespective of release date.
- Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?
Click here to view code image
ls -l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt- Read only
- Read, write *
- Full access
- Read, write, execute
- Which two methods can be used to harden a computing device? (Choose two.)
- Allow default services to remain enabled.
- Update patches on a strict annual basis irrespective of release date.
- Enforce the password history mechanism.
- Ensure physical security.
- Allow USB auto-detection.
- What is the main purpose of the X Window System?
- to provide a customizable CLI environment
- to provide a basic framework for a GUI
- to provide remote access to a Linux-based system
- to provide a basic set of penetration testing tools
- Which Linux command is used to manage processes?
- kill
- grep
- chrootkit
- ls
- Why is Linux considered to be better protected against malware than other operating systems?
- fewer deployments
- integrated firewall
- customizable penetration and protection tools
- file system structure, file permissions, and user account restrictions
- Why would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)?
- It is easier to use than other operating systems.
- It is more secure than other server operating systems.
- The administrator has more control over the operating system.
- More network applications are created for this environment
- Which Linux command can be used to display the name of the current working directory?
- chmod
- pwd
- ps
- sudo
- Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?
ls –l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt- write only
- read, write, execute
- read, write
- read only
- A Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment?
- file viewer
- package management tool
- terminal emulator
- system viewer
- The image displays a laptop that is acting as the SSH client that is communicating with an SSH server. Refer to the exhibit. Which well-known port number is used by the server?
- 23
- 22
- 21
- 25
- Which Linux component would be used to access a short list of tasks theapplication can perform?
- Launcher
- Quicklist *
- Dash Search Box
- System and Notification Menu
- Which term is used to describe a running instance of a computer program?
- Fork
- Patch
- Process *
- Package manager
- Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?
- Firewall
- PenTesting *
- Malware analysis
- Intrusion detection system
- How is a server different from a workstation computer?
- The server works as a standalone computer.
- The server is designed to provide services to clients.
- The workstation has fewer applications installed.
- The workstation has more users who attach to it.
- Which two Linux commands might be used before using the kill command? (Choose two.)
- top
- ls
- grep
- ps
- chroot
- What term is used for operating system updates?
- patches
- new releases
- penetration testing
- packages
- What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?
- penetration testing
- package manager
- rootkit
- compiler
- What is the well-known port address number used by DNS to serve requests?
- 60
- 110
- 25
- 53
- Which file system is the primary file system used by Apple in current Macintosh computers?
- CDFS
- APFS
- ext3
- ext2
- HFS+
- Which type of tool allows administrators to observe and understand every detail of a network transaction?
- malware analysis tool
- packet capture software
- ticketing system
- log manager
- Which command can be utilized to view log entries of NGINX system events in real time?
- sudo journalctl –u nginx.service -f
- sudo journalctl –f
- sudo journalctl –until “1 hour ago”
- sudo journalctl –u nginx.services
- What is the purpose of a Linux package manager?
- It provides access to settings and the shutdown function.
- It is used to compile code that creates an application.
- It is used to install an application.
- It provides a short list of tasks a particular application can perform.
- Which user can override file permissions on a Linux computer?
- only the creator of the file
- any user that has ‘group’ permission to the file
- any user that has ‘other’ permission to the file
- root user
- Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss?
- ext2
- ext3
- NFS
- CDFS
- What is the method employed by a Linux kernel to create new processes for multitasking of a process?
- creating interdependent processes
- dynamic processes
- pipelining
- forking
- What is a purpose of apt-get commands?
- to configure an appointment for a specific date and time
- to configure and manage task (to-do) lists
- to update the operating system
- to apportion and configure a part of the hard disk for file storage