1/143
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What command would you use to list hidden files in linux?
ls -a
Which is a correct statement given about the Linux and Windows filesystem?
A linux filesystem begins with the absolute path of "/" while Windows begins a drive letter
Which of the following best describes the role of the root directory in a computer's file system?
It is the top-level directory from which all other directories branch.
How does the hierarchical structure of a file system help users and operating systems manage data efficiently?
It organizes files into directories and subdirectories, allowing logical grouping and easier navigation
Evaluate the usage of rmdir on a directory containing two files with the extensions of .exe and .dat inside of it.
Only an error is returned and the directory isn't deleted.
How would you print the first 10 lines of what's inside miscellaneous.txt in the directory?
head miscellaneous.txt
In order to perform a command with sudo, what does the CLI ask you for?
Administrator password to verify user before command
Differentiate the "less" command from the "cat" command.
"less" displays the contents of the file page-by-page while "cat" outputs all of the contents
How does the configuration of standard security features contribute to the security within a system?
The configuration of standard security features increases the level of security
What are software vulnerabilities?
Holes or weaknesses in software application code that can disrupt operations or damage data
Which of the following are examples of habits one can take to improve the level of security of their system?
All of the above are correct
An organization was recently affected by software vulnerabilities. How can the organization reduce the risk of further software vulnerabilities?
Ensure all their software is up-to-date|Roll back software to previous versions
How many characters in MINIMUM should be in a password?
13
Which of the following best describes authentication?
Authentication is the process of verifying a user's identity.
Should you use your birthday as a password?
No, birthdays are easily guessable information.
Which of the following passwords would be considered the weakest according to strong password guidelines?
ILoveCats123
Which activity is specifically listed as a use for computer systems by an Individual?
Managing personal finance and social activities
Which set of three concepts represents the core goals that cybersecurity seeks to ensure for data and systems?
Confidentiality, Integrity, and Availability
When a security breach leads to the loss of intellectual property or trade secrets for an Organization, which type of consequence is this most directly related to?
Loss of financial viability and competitive edge
The use of computer systems by Governments to provide services like healthcare and the use by Organizations to store proprietary information both share the common need to manage and protect what general category of information?
Sensitive and/or proprietary data
A file system has a logical structure where data is stored as files in an organized manner. Where are they stored?
A Directory
While using the CLI (Command Line Interface), when the command "cd /" is used, what is it doing?
Opening into the root directory
What is the difference between a GUI (Graphical User Interface) and a CLI (Command Line Interface)?
A GUI uses images and icons for users to intuitively navigate the machine. A CLI is text-based advanced administration.
On a company device, an employee, Nick Beyer, has prohibited media files in their Picture Directory. The operating system the machine uses is Windows. What file path would you take to the Picture Directory?
C:\Users\NickBeyer\Pictures
Which of the following is the most effective way to defend against phishing attacks?
Educating users to recognize common phishing traits and verify requests through other channels
Which of the following is NOT a common delivery method for social engineering attacks?
Software patch updates
What is the main goal of a social engineering attack?
To manipulate people into revealing sensitive information or performing unsafe actions
An attacker tries to gain unauthorized access to a building by closely following an employee through the door without the employee knowing. The attacker does not ask for permission. What is this tactic called?
Tailgating
What is a common software-related cause of slow device performance?
Too many background processes running
What tool can be used in Windows to check for high CPU or memory usage?
Task Manager
A user reports their laptop is running slowly and becomes unresponsive after opening several applications. What is the most appropriate first step to troubleshoot this issue?
Check system resource usage in Task Manager
A desktop computer frequently shuts down unexpectedly and feels hot to the touch. Which of the following is the most likely cause of the issue?
Overheating due to poor ventilation
What is the primary purpose of a UPS?
To provide a backup power source during outages
What is one major security risk associated with IoT devices?
They usually come with insecure default settings
Why is it important to maintain up to date software on personal devices?
To apply the latest security patches
What does authentication do before allowing access to resources or data?
Establishes the identity of a user, process, or device
What is the main job of the CPU in a computer?
It processes data and carries out instructions.
What is RAM used for?
It temporarily stores data the CPU is currently using
How does a multicore CPU improve a computer's performance?
It allows the computer to run multiple processes simultaneously, speeding up multitasking.
Why is RAM considered volatile memory while storage drives are nonvolatile?
RAM needs power to keep data, while storage drives keep data even when the power is off
What is a CLI an abbreviation for?
Command Line Interface
What does a CLI do?
Lets you interact with a computer via complex text-based commands
How can CLI commands change computer settings?
Text-based commands allow a user to change computer settings by directly interacting with the operating system's core functionalities and configuration files
How does a CLI and a GUI operate differently?
A CLI solely operates via text-based commands, allowing for efficiency, at the cost of ease of use; a GUI operates via a beginner-friendly interface involving clicks, buttons, and icons, at the cost of efficiency
Consider the following CLI command entered by a Linux user: ls -la ~/Documents .Which of the following best describes what this command will do?
Display a detailed list of all files, including hidden ones, in the user's Documents directory
You are in the /home/student/projects directory. Which command would return you to the root directory?
cd /
On a Windows system, which of the following file paths is considered relative?
.\Downloads
You enter the following command in a Linux terminal:ls -a /home/user .What will this command do?
List all files and directories, including hidden ones, in /home/user|List only hidden files in the /home/user directory
Which of the following correctly describes an absolute file path in a Linux operating system?
A path that begins with the root directory symbol (/)
Which of the following best describes a phishing attack?
An attempt to get sensitive information through a fake website or email
A person asks to be let into a secure area by claiming they forgot their badge and are carrying heavy items. What tactic are they using?
Piggybacking
What is the main difference between phishing and spear phishing?
Spear phishing targets specific individuals phishing is more general|Phishing is done over the phone spear phishing is only in person
A small business stores customer data on desktop computers in an open office space. Recently, an unauthorized person accessed a computer after hours and viewed confidential client files. The business owner wants to implement multiple security controls to prevent this from happening again.
Implement physical access restrictions to the office and require authentication to log into devices
Which of the following best describes multifactor authentication?
A user must input various information types to access an account
What is an SSO and its function?
A Single Sign-On, which allows users to access multiple applications through a single set of credentials
Which of the following demonstrates an advantage and a drawback of biometric authentication?
Biometrics are difficult to impersonate, but often expensive to implement and maintain
Why might an organization be hesitant to use physical authenticators for their employees?
Physical authenticators may be relatively more expensive than other forms of authentication.
What tools can you use to monitor system resources on Windows, Mac, and Linux?
Task Manager, Activity Monitor, and top command
Name two common hardware problems and two common software problems
Two common hardware problems are damaged or unplugged power supply, and damaged or low Ram. Two common software problems are outdated software, and viruses or malware.
Why is performing a power cycle often an effective first step in troubleshooting a device?
A power cycle is an effective first step because it can reset network connections
How can checking system resource usage help identify the cause of slow device performance?
Checking system resources help identify the cause of slow performance because it identifies if there is high usage of CPU, memory, or disk usage
How is data stored and where are the locations of the data stored?
Data is stored in files. While the locations of data are stored in directories.
.
What is the purpose of a Command Line Interface (CLI)?
A (CLI) provides a faster, more customized and more efficient administration of networks and computer systems.
Why is a (CLI) more advanced than a (GUI)?
A (CLI) offers greater control, efficiency, and automation capabilities than a (GUI
What can you infer about how a Windows file system stores information?
A Windows file system would store information on various drives, each of which is represented with a drive letter
What can happen if your computer's RAM is low or damaged?
The computer runs slowly
What is a common hardware problem in a computer or device?
Overheating
What should you do if your computer stops responding and freezes?
unplug it and plug it back in
What is one example of a common software problem?
Outdated software
Cybersecurity ensures the confidentiality, integrity, and _____ of data and Systems
Availabilty
A breach of security can lead to ____ Identity.
Theft
Why is cybersecurity important for governments?
To protect education and public safety
Which of the following best explains why connected devices are at risk?
They can be accessed over networks, exposing them to attacks
Describe what a computer system is made up of.
A computer system is made up Hardware, Software, and Data|A computer system is made up only of software and data, as hardware is not necessary for running programs.
Why might a computer system crash or run slowly if it does not have enough RAM?
Because insufficient RAM limits the system's ability to handle active data and operations.
Identify which acronym stands for CPU.
The acronym for CPU stands for Central Processing Unit.
How does the nonvolatile nature of storage devices like SSDs and HDDs affect the way computers save data?
It allows data to be saved permanently even when the computer is powered off.
What purposes do firmware serve for other types of software in a computer system?
Serves as the base for giving orders to run the system hardware/software while retaining itself a low level component on the machine itself
Infer which instances would be the best time to use a VM?
A VM can be used at any time, but is best applied as a honey pot, while also being a cost effective way to run multiple machines.
What is the difference between a BIOS and a UEFI?
Exactly the same except a UEFI is able to handle larger hard drives with a shorter boot time, with a more user friendly GUI (Graphical User Interface).
What is the main purpose of a driver on a computer?
To run hardware with software
What is the most secure method of protecting an account from a brute-force attack?
Using Multi-Factor Authentication
What is the least secure form of Multi-Factor Authentication?
One-time passcode through Email
What does MFA stand for in cybersecurity?
Multifactor Authentication
Which of the following is an example of biometric authentication?
Fingerprint scan
Why is multifactor authentication (MFA) more secure than using only a password?
It requires more than one form of identification, reducing the risk if one is compromised
How does Single Sign-On (SSO) improve both user convenience and security?
It allows users to access multiple services with one login, reducing stored credentials
Your company's IT department rolled out a secure password policy to reduce account compromises. The policy's single, clearly stated rule for employees is: do not reuse the same password across different accounts — every corporate and external account must have its own password. Which of the following employee actions complies with that rule?
Creating a different, unique password for the corporate email account and a different, unique password for the cloud storage service
Is having multiple different passwords for different accounts rather than the same password for each account more secure?
Yes because it prevents an adversary from using a compromised password to further access other accounts with the same password
Examine the following unsecure password and evaluate it with your understanding of password structure and security requirements: bigbluemonkiesarecool. Which of the following passwords would be most secure?
B1gB!u3M0nki3$@r3(00L
Compare the following two passwords, '34y*^K$F9a"k\[' and 'jErrygOdTfQhOf', why exactly would the first one be most secure? Note: They are both the same length.
The first one is most secure because it utilizes all complex structures, it uses uncommon special characters, numbers, different capitalizations, barely any letters, and lacks user information.
What does the CIA triad of data stand for?
Confidentiality, Integrity, Availability
Which of the following could be a severe consequence of a security breach?
Legal penalties and fines
Which of the following is not a severe consequence of a breach in security?
Increased customer trust
What is the application of the CIA triad?
To ensure the security of data through Confidentiality, Integrity, and Availability
What threats can be deterred using security controls?
Physical and digital threats
What can protect devices against failures and disconnections between nodes?
Power backups and redundancies
What is the difference between deterring authentication and physical and digital threats?
Authentication prevents unauthorized access and physical and digital threats protect devices from attacks or damages
How does security controls such as authentication and power backups help protect devices and data?
Authentication gets rid of unauthorized access, power backups prevent data loss during failures