IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Operating Systems BasicsWhich user can override file permissions on a Linux computer?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich method can be used to harden a device?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat would be a reason for a computer user to use the Task Manager Performance tab?ITExamAnswers asked 4 years ago • IT Essentials, Endpoint Security, Operating Systems BasicsWhat is the purpose of the cd\ command?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat would be displayed if the netstat -abno command was entered on a Windows PC?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsA client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsConsider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsMatch typical Linux log files to the function.IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat is a daemon?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsA user creates a file with .ps1 extension in Windows. What type of file is it?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich Linux command can be used to display the name of the current working directory?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat technology was created to replace the BIOS program on modern personal computer motherboards?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich file system is the primary file system used by Apple in current Macintosh computers?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8, Operating Systems BasicsWhich Windows tool can be used by a cybersecurity administrator to secure stand-alone computers that are not part of an active directory domain?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhy would a rootkit be used by a hacker?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Operating Systems Basics