CCNA Cybersecurity Operations (Vesion 1.1) – CyberOps Chapter 3 Exam Answers
- Which method can be used to harden a computing device?
- Allow USB auto-detection.
- Force periodic password changes. *
- Allow default services to remain enabled.
- Update patches on a strict annual basis irrespective of release date.
Click here to view code image
ls -l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt
- Read only
- Read, write *
- Full access
- Read, write, execute
- Allow default services to remain enabled.
- Update patches on a strict annual basis irrespective of release date.
- Enforce the password history mechanism.
- Ensure physical security.
- Allow USB auto-detection.
- to provide a customizable CLI environment
- to provide a basic framework for a GUI
- to provide remote access to a Linux-based system
- to provide a basic set of penetration testing tools
- kill
- grep
- chrootkit
- ls
- fewer deployments
- integrated firewall
- customizable penetration and protection tools
- file system structure, file permissions, and user account restrictions
- It is easier to use than other operating systems.
- It is more secure than other server operating systems.
- The administrator has more control over the operating system.
- More network applications are created for this environment
- chmod
- pwd
- ps
- sudo
ls –l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt
- write only
- read, write, execute
- read, write
- read only
- file viewer
- package management tool
- terminal emulator
- system viewer
- 23
- 22
- 21
- 25
- Launcher
- Quicklist *
- Dash Search Box
- System and Notification Menu
- Fork
- Patch
- Process *
- Package manager
- Firewall
- PenTesting *
- Malware analysis
- Intrusion detection system
- The server works as a standalone computer.
- The server is designed to provide services to clients.
- The workstation has fewer applications installed.
- The workstation has more users who attach to it.
- top
- ls
- grep
- ps
- chroot
- patches
- new releases
- penetration testing
- packages
- penetration testing
- package manager
- rootkit
- compiler
- 60
- 110
- 25
- 53
- CDFS
- APFS
- ext3
- ext2
- HFS+
- malware analysis tool
- packet capture software
- ticketing system
- log manager
- sudo journalctl –u nginx.service -f
- sudo journalctl –f
- sudo journalctl –until “1 hour ago”
- sudo journalctl –u nginx.services
- It provides access to settings and the shutdown function.
- It is used to compile code that creates an application.
- It is used to install an application.
- It provides a short list of tasks a particular application can perform.
- only the creator of the file
- any user that has ‘group’ permission to the file
- any user that has ‘other’ permission to the file
- root user
- ext2
- ext3
- NFS
- CDFS
- creating interdependent processes
- dynamic processes
- pipelining
- forking
- to configure an appointment for a specific date and time
- to configure and manage task (to-do) lists
- to update the operating system
- to apportion and configure a part of the hard disk for file storage