220-1002 Quiz 2 Flashcards
(44 cards)
What Windows command partitions disks?
diskpart
Which of the following commands in Windows Command Prompt changes the current directory to the root directory?
cd \
dir /root
cd ..
chdir /r
cd \
What Windows command changes working directory?
cd
What Windows command terminates processes and kills tasks?
taskkill
What Windows command shuts down the computer?
shutdown
In a virtualization environment, a host-based hypervisor is which type of hypervisor?
Type 1
Type 2
Emulated
Bare metal
Type 2
Which type of Hypervisor is VMware Workstation™?
Bare metal
Type 1
Host-based
Intel VT-x
Host-based
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
-a
/?
/all
/a
/all
Which of the following refers to capturing and reading data packets as they move over the network?
MAC (Media Access Control) Flooding
ARP (Address Resolution Protocol) Poisoning
Man-in-the-Middle (MITM)
Eavesdropping
Eavesdropping
What Windows command displays group policy results for the user?
gpresult
What is the name of an MS Windows command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
net use
ipconfig
netstat
ipconfig
What can door locks be categorized as? (Select all that apply.)
Deadbolt
Electronic
Conventional
Token-based
Deadbolt
Electronic
Conventional
Token-based
Which of the following refer to stealing a password or PIN, or other secure information, by watching the user type it?
Tailgating
Impersonation
Shoulder Surfing
Pharming
Shoulder Surfing
A command-line utility used for checking the reachability of a remote network host is known as:
ping
tracert
dig
netstat
ping
When configuring Microsoft Hyper-V as a hypervisor, three types of virtual switches can be created. Which type is used by the virtual machine and the host only?
Internal
Private
External
Emulated
Internal
Netstat is a command-line utility used for: (Select 2 answers)
Displaying active TCP/IP connections
Testing the reachability of a remote host
Displaying intermediary points on the packet route
Viewing the TCP/IP configuration details
Displaying network protocol statistics
Displaying active TCP/IP connections
Displaying network protocol statistics
The use of encryption and other digital security techniques provides users with three important security requirements on computer networks: confidentiality, integrity, and availability. What are the principal types of cryptographic technology? (Select all that apply.)
Public Key Infrastructure (PKI)
Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption
Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption
Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)?
cd \
cd /up
cd +
cd ..
cd ..
What Windows command copies files?
copy
xcopy
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)
ipconfig /down
ipconfig /release
ipconfig /up
ipconfig /renew
ipconfig /release
ipconfig /renew
What Windows command checks system files?
sfc
What refers to logical security technologies designed to prevent malicious software from running on a host and can establish a security system that does not entirely depend on the good behavior of individual users?
Trusted/Untrusted Software Sources
Disable Auto Run
Anti-Virus/Anti-Malware
Execution Contro
Execution Control
What Windows command creates a file system?
format
Which of the following cloud computing characteristics allows resources to be provisioned to scale up or down as required by the customer?
Resource pooling
Measured service
Rapid elasticity
On-demand self service
Rapid elasticity