Question: Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of

Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss? *

5 points

ext2

ext3

NFS

CDFS

Which user can override file permissions on a Linux computer? *

5 points

only the creator of the file

any user that has group permission to the file

any user that has other permission to the file

root user

Which command can be utilized to view log entries of NGINX system events in real time? *

5 points

sudo journalctl u nginx.service -f

sudo journalctl f

sudo journalctl until 1 hour ago

sudo journalctl u nginx.services

Which two Linux commands might be used before using the kill command? (Choose two.) *

10 points

top

ls

grep

ps

chroot

Why is Linux considered to be better protected against malware than other operating systems? *

5 points

fewer deployments

integrated firewall

customizable penetration and protection tools

file system structure, file permissions, and user account restrictions

Which Linux command is used to manage processes? *

5 points

kill

grep

chrootkit

ls

Which two methods can be used to harden a computing device? (Choose two.) *

10 points

Allow default services to remain enabled.

Update patches on a strict annual basis irrespective of release date.

Enforce the password history mechanism.

Ensure physical security.

Allow USB auto-detection.

Which net command is used on a Windows PC to establish a connection to a shared directory on a remote server? *

5 points

net use

net start

net share

net session

Which two things can be determined by using the ping command? (Choose two.) *

10 points

the number of routers between the source and destination device

the destination device is reachable through the network

the average time it takes each router in the path between source and destination to respond

the IP address of the router nearest the destination device

the average time it takes a packet to reach the destination and for the response to return to the source

Which type of Windows PowerShell command performs an action and returns an output or object to the next command that will be executed? *

5 points

scripts

functions

cmdlets

routines

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.) *

10 points

ipconfig /flushdns

net cisco.com

nslookup cisco.com

ping cisco.com

nbtstat cisco.com

Refer to the exhibit. A cyber security administrator is attempting to view system information from the Windows PowerShell and recieves the error message shown. What action does the administrator need to take to successfully run the command? *

5 points

Run the command from the command prompt.

Install latest Windows updates.

Restart the abno service in Task Manager.

Run PowerShell as administrator.

Refer to the exhibit. A cybersecurity analyst is investigating a reported security incident on a Microsoft Windows computer. Which tool is the analyst using? *

5 points

Event Viewer

PowerShell

Task Manager

Performance Monitor

Consider the path representation in Windows CLI C:\Users\Jason\Desktop\mydocu.txt. What does the Users\Jason component represent? *

5 points

file directory and subdirectory

current file directory

file attribute

storage device or partition

What are two advantages of the NTFS file system compared with FAT32? (Choose two.) *

10 points

NTFS allows the automatic detection of bad sectors.

NTFS is easier to configure.

NTFS allows faster formatting of drives.

NTFS provides more security features.

NTFS supports larger files.

NTFS allows faster access to external peripherals such as a USB drive.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!