IT APPLITCATIONS 10: USING SUPPORT AND SCRIPTING TOOLS Flashcards

1
Q

Creating full backups with lower data transfer requirements

A

Synthetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When the administrator installed software, they must accept what license?

A

EULA (End-user License Agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Larger organizations will provide a dedicated what as a single point of contact so that a security incident can be reported through the proper channels?

A

CSIRT (Computer Security Incident Response Team)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security engineer wants to learn how to code in Python but is running a Windows box. Which of the following is the easiest interpreter to set up for Windows?

A

CPython

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user experiences issues with their computer and has asked someone to remote desktop onto their computer to help resolve the issue. Unfortunately, the firewall only allows port 443 traffic. What should they use for assistance?

A

Quick Assist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Linux administrator is looking at the bash history and sees the command chmod u+x file.sh. What was trying to be done with this command?

A

Set Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the 3-2-1 rule?

A

Three Copies, 2 Media Types, 1 off-side copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security analyst working on a monitoring team wants to implement new monitoring mechanisms around Secure Shell (SSH) authentication, what do they focus on?

A

Monitor for compromised keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What performs drive mapping in a Windows-only concept?

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Allows devices to be remotely powered on over a network

A

WOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Principally designed for use by managed service providers?

A

RMM (Remote Monitoring and Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A server administrator is setting up a backup program for the servers to ensure recovery. Which of the following are the two main principles of backing up?

A

Frequency & Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user is reviewing a script and comes across the code in one of the lines #until ping -c1 “$1” &>/dev/null. What is the line doing?

A

Nothing is executing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A soldier at a government facility accidentally typed up a report on the wrong system and needs to ensure that the file is not recoverable. What should be done?

A

Perform a secure erase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Windows administrator is combing through server logs and sees that a wscript.exe executed a script. What type of script is executed by default?

A

.VBS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat actor’s techniques is to perform a denial of service against the Remote Desktop Protocol (RDP) functionality in servers. What can the company enable to help prevent this?

A

NLA (Network Level Authentication)

17
Q

A database administrator is scheduled for a meeting with the security team to discuss compliance with the PCI DSS standards. What type of information does it safeguard?

A

PINs

18
Q

A security architect sets up a policy for the secure destruction of optical media. Which of the following is NOT an effective method?

A

Degaussing

19
Q

A helpdesk operator normally works with Windows computers in the environment, but the company starts rolling out test Mac computers. The operator needs to connect to a user’s Mac. What tool would the operator likely use?

A

VNC (Virtual Network Computing)

20
Q

A user accidentally deleted the presentation they were working on for an important upcoming meeting. Where should the user go for help?

A

File History