Question: Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of
Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss? *
5 points
ext2
ext3
NFS
CDFS
Which user can override file permissions on a Linux computer? *
5 points
only the creator of the file
any user that has group permission to the file
any user that has other permission to the file
root user
Which command can be utilized to view log entries of NGINX system events in real time? *
5 points
sudo journalctl u nginx.service -f
sudo journalctl f
sudo journalctl until 1 hour ago
sudo journalctl u nginx.services
Which two Linux commands might be used before using the kill command? (Choose two.) *
10 points
top
ls
grep
ps
chroot
Why is Linux considered to be better protected against malware than other operating systems? *
5 points
fewer deployments
integrated firewall
customizable penetration and protection tools
file system structure, file permissions, and user account restrictions
Which Linux command is used to manage processes? *
5 points
kill
grep
chrootkit
ls
Which two methods can be used to harden a computing device? (Choose two.) *
10 points
Allow default services to remain enabled.
Update patches on a strict annual basis irrespective of release date.
Enforce the password history mechanism.
Ensure physical security.
Allow USB auto-detection.
Which net command is used on a Windows PC to establish a connection to a shared directory on a remote server? *
5 points
net use
net start
net share
net session
Which two things can be determined by using the ping command? (Choose two.) *
10 points
the number of routers between the source and destination device
the destination device is reachable through the network
the average time it takes each router in the path between source and destination to respond
the IP address of the router nearest the destination device
the average time it takes a packet to reach the destination and for the response to return to the source
Which type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed? *
5 points
scripts
functions
cmdlets
routines
Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.) *
10 points
ipconfig /flushdns
net cisco.com
nslookup cisco.com
ping cisco.com
nbtstat cisco.com
Refer to the exhibit. A cyber security administrator is attempting to view system information from the Windows PowerShell and recieves the error message shown. What action does the administrator need to take to successfully run the command? *
5 points
Run the command from the command prompt.
Install latest Windows updates.
Restart the abno service in Task Manager.
Run PowerShell as administrator.
Refer to the exhibit. A cybersecurity analyst is investigating a reported security incident on a Microsoft Windows computer. Which tool is the analyst using? *
5 points
Event Viewer
PowerShell
Task Manager
Performance Monitor
Consider the path representation in Windows CLI C:\Users\Jason\Desktop\mydocu.txt. What does the Users\Jason component represent? *
5 points
file directory and subdirectory
current file directory
file attribute
storage device or partition
What are two advantages of the NTFS file system compared with FAT32? (Choose two.) *
10 points
NTFS allows the automatic detection of bad sectors.
NTFS is easier to configure.
NTFS allows faster formatting of drives.
NTFS provides more security features.
NTFS supports larger files.
NTFS allows faster access to external peripherals such as a USB drive.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
