PBQs & Lab Qs Flashcards
A special type of malware that hijacks system resources to mine cryptocurrencies. It is often linked to and performs over mass botnets.
Cryptominer
A type of malware that seeks to track user activity. Often paired with keylogger. Performs redirection to spoofed sites.
Spyware
Malware that digs deep into firmware to try to be undetectable from the OS and the user. Attempts to escalate to the highest privileges. Infects firmware code.
rootkit
Malware packaged as a useful application. Used by attackers to conceal actions.
Trojan
Replication requires user interaction.
Viruses
Backup data type
All selected data regardless of when it was previously backed up.
Full
Backup data type
All data modified since the last full backup Moderate/moderate
Differential
Backup data type
New files and files modified since last backup
Incremental
True or False? The xcopy command will copy specified files and directories.
True
What is the purpose of DHCP?
a) To create a secure internet gateway.
b) To route traffic outside of the network.
c) To provide IP addresses to devices.
d) To resolve hostnames to IP addresses.
c) To provide IP addresses to devices.
Which of the following tasks is MOST likely to be an optional rather than required consideration during physical installation of the wireless router?
a) Proximity to wired PC workstation
b) Proximity to building power socket
c) Proximity to ISP network port
d) Safe location to minimize risks from knocks and spills
a) Proximity to wired PC workstation
Which of the following wireless authentication methods would provide better security on a typical home network?
a) WPA2-SAE
b) WEP-SAE
c) WPA3-EAP
d) WEP-EAP
e) WPA3-SAE
f) WPA2-EAP
e. WPA3-SAE
When configuring a home web server, the destination port was set to 80. What specific type of configuration would have been achieved by setting the destination port to 8080?
a) Port mapping
b) Port triggering
c) UPnP
d) DMZ host
a. Port mapping
Which password setting prevents a password from being re-used?
a) Lockout
b) Complexity
c) Age
d) History
d) History
Why is it important to test that security changes work as expected?
a) Windows has poor security
b) It’s easy to make a mistake
c) Policy settings are glitchy
d) Changes to security take effect after testing
b) It’s easy to make a mistake
What is the name of the tool used to enforce security settings on a Windows computer?
a) Local Security Protector
b) Local Security Policy
c) Local Security Setting
d) Local Security Defender
b) Local Security Policy
What is the default minimum password length allowed by Windows?
a) 8
b) 10
c) 0
d) 6
c) 0
What is an eicar file?
a) An anti-virus testing tool
b) A scanner exclusion
c) A macro virus
d) A malicious virus
a) An anti-virus testing tool
What is a path exclusion?
a) Defines a folder location to always scan
b) Defines a file to always scan
c) Defines a file to never scan
d) Defines a folder location to never scan
d) Defines a folder location to never scan
Which of the following best describes group policy?
a) File and folder permissions
b) An administrative tool for updating anti-virus
c) A special type of anti-virus
d) An administrative tool for enforcing settings
d) An administrative tool for enforcing settings
What is the command to force a refresh of group policies?
a) updatepolicy /now
b) updpolicy /now
c) grouppol /force
d) gpupdate /force
d) gpupdate /force
Which of the following tools can be used to remotely access a Linux computer?
a) WMI
b) SSH
c) ADUC
d) Get-RemoteAccess
b) SSH
True or False. Remote Desktop Connections can only be established using Windows computers.
False.
Which of the following commands could be used to install the secure shell server service on Ubuntu?
a) ssh install sudo apt
b) sudo install ssh apt
c) sudo apt install ssh
d) install ssh sudo apt
c) sudo apt install ssh