Check answers here:
Modules 3 – 4: Operating System Overview Group Exam (Answers)
Quiz-summary
0 of 38 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
Information
Modules 3 - 4: Operating System Overview Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 38 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- Answered
- Review
-
Question 1 of 38
1. Question
1 pointsWhy would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)?Correct
Incorrect
-
Question 2 of 38
2. Question
1 pointsWhich two methods can be used to harden a computing device? (Choose two.)Correct
Incorrect
-
Question 3 of 38
3. Question
1 pointsWhich Linux command can be used to display the name of the current working directory?Correct
Incorrect
-
Question 4 of 38
4. Question
1 pointsConsider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt
Correct
Incorrect
-
Question 5 of 38
5. Question
1 pointsA Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment?Correct
Incorrect
-
Question 6 of 38
6. Question
1 pointsWhat is the well-known port address number used by DNS to serve requests?Correct
Incorrect
-
Question 7 of 38
7. Question
1 pointsWhich user can override file permissions on a Linux computer?Correct
Incorrect
-
Question 8 of 38
8. Question
1 pointsMatch the commonly used ports on a Linux server with the corresponding service.Correct
Incorrect
-
Question 9 of 38
9. Question
1 pointsMatch typical Linux log files to the function.Correct
Incorrect
-
Question 10 of 38
10. Question
1 pointsWhich type of tool allows administrators to observe and understand every detail of a network transaction?Correct
Incorrect
-
Question 11 of 38
11. Question
1 pointsWhy is Kali Linux a popular choice in testing the network security of an organization?Correct
Incorrect
-
Question 12 of 38
12. Question
1 pointsMatch the octal value to the file permission description in Linux. (Not all options are used.)Correct
Incorrect
-
Question 13 of 38
13. Question
1 pointsMatch the Linux command to the function. (Not all options are used.)Correct
Incorrect
-
Question 14 of 38
14. Question
1 pointsWhat are two advantages of the NTFS file system compared with FAT32? (Choose two.)Correct
Incorrect
-
Question 15 of 38
15. Question
1 pointsA PC user issues the netstat command without any options. What is displayed as the result of this command?Correct
Incorrect
-
Question 16 of 38
16. Question
1 pointsWhich two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)Correct
Incorrect
-
Question 17 of 38
17. Question
1 pointsWhat is the purpose of using the net accounts command in Windows?Correct
Incorrect
-
Question 18 of 38
18. Question
1 pointsMatch the Windows 10 boot sequence after the boot manager (bootmgr.exe) loads.Correct
Incorrect
-
Question 19 of 38
19. Question
1 pointsA technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What can the technician do to resolve this problem?Correct
Incorrect
-
Question 20 of 38
20. Question
1 pointsWhich statement describes the function of the Server Message Block (SMB) protocol?Correct
Incorrect
-
Question 21 of 38
21. Question
1 pointsA user creates a file with .ps1 extension in Windows. What type of file is it?Correct
Incorrect
-
Question 22 of 38
22. Question
1 pointsMatch the Windows command to the description.Correct
Incorrect
-
Question 23 of 38
23. Question
1 pointsA user logs in to Windows with a regular user account and attempts to use an application that requires administrative privileges. What can the user do to successfully use the application?Correct
Incorrect
-
Question 24 of 38
24. Question
1 pointsAn IT technician wants to create a rule on two Windows 10 computers to prevent an installed application from accessing the public Internet. Which tool would the technician use to accomplish this task?Correct
Incorrect
-
Question 25 of 38
25. Question
1 pointsWhat technology was created to replace the BIOS program on modern personal computer motherboards?Correct
Incorrect
-
Question 26 of 38
26. Question
1 pointsMatch the Linux system component with the description. (Not all options are used.)Correct
Incorrect
-
Question 27 of 38
27. Question
1 pointsWhat is the outcome when a Linux administrator enters the man man command?Correct
Incorrect
-
Question 28 of 38
28. Question
1 pointsMatch the description to the Linux term. (Not all options are used.)Correct
Incorrect
-
Question 29 of 38
29. Question
1 pointsWhat are two benefits of using an ext4 partition instead of ext3? (Choose two.)Correct
Incorrect
-
Question 30 of 38
30. Question
1 pointsConsider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?ls -l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt
Correct
Incorrect
-
Question 31 of 38
31. Question
1 pointsWhat is the purpose of entering the netsh command on a Windows PC?Correct
Incorrect
-
Question 32 of 38
32. Question
1 pointsWhich type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed?Correct
Incorrect
-
Question 33 of 38
33. Question
1 pointsA user creates a file with .ps1 extension in Windows. What type of file is it?Correct
Incorrect
-
Question 34 of 38
34. Question
1 pointsMatch the Windows system tool with the description. (Not all options are used.)Correct
Incorrect
-
Question 35 of 38
35. Question
1 pointsIn the Linux shell, which character is used between two commands to instruct the shell to combine and execute these two commands in sequence?Correct
Incorrect
-
Question 36 of 38
36. Question
1 pointsWhy is Linux considered to be better protected against malware than other operating systems?Correct
Incorrect
-
Question 37 of 38
37. Question
1 pointsMatch the commonly used ports on a Linux server with the corresponding service. (Not all options are used.)Correct
Incorrect
-
Question 38 of 38
38. Question
1 pointsWhich Windows tool can be used by a cybersecurity administrator to secure stand-alone computers that are not part of an active directory domain?Correct
Incorrect