Gfact practice Exam Questions With Correct
Answers
Which |of |the |following |is |a |power |connector |used |by |graphics |cards?
PCI-E
3 |multiple |choice |options
Which |key |combination |can |be |used |to |send |an |interrupt |signal |to |most |applications |running |
in |the |Linux |terminal |to |stop |applications |execution?
CTRL |+ |C
3 |multiple |choice |options
When |a |laaS |model |is |employed, |which |layer |of |the |stack |will |be |managed |by |the |customer?
Operating |system
3 |multiple |choice |options
Which |of |the |following |Linux |commands |will |displayu |the |files |in |the |current |directory?
ls |-l
3 |multiple |choice |options
An |alert |indicated |that |a |compromised |host |was |used |by |an |attacker |to |run |the |command |
below. |What |is |the |attacker |attempting |to |accomplish?
$ |nmap |-sS |192.168.10.0/24
Identify |services |running |on |a |network |hosts
3 |multiple |choice |options
In |Git, |which |of |the |following |allows |work |on |specific |features |to |occur |independently?
Branch
3 |multiple |choice |options
, How |can |a |directory |traversal |vulnerability |be |mitigated?
Use |an |index
3 |multiple |choice |options
What |step |should |be |taken |to |prevent |CSRF |flaws?
Replace |HTTP |cookies |with |additional |session |tracking |methods
3 |multiple |choice |options
How |is |data |handled |on |the |stack |in |an |assembly |program?
First |in, |last |out
3 |multiple |choice |options
What |Windows |configuration |utility |can |be |used |by |a |local |administrative |user |to |create |an |
account |which |requires |the |password |to |be |reset |upon |first |login?
Local |User |Management |Console
3 |multiple |choice |options
Which |Windows |protection |mechanism |displays |a |warning |when |an |application |is |attempting |
to |run |under |elevated |privileges?
User |Account |Control
3 |multiple |choice |options
Which |of |the |following |data |types |is |most |closely |associated |with |network |forensics?
SIEM |logs
3 |multiple |choice |options
Which |of |the |following |VIM |commands |will |save |your |changes |to |a |file |and |exit |the |editor?
:x
3 |multiple |choice |options
How |can |a |new |user |be |added |to |the |system |with |the |Windows |command |line?
net |user/add |user1 |p@ssw0rd
3 |multiple |choice |options
Which |operating |system |kernel |is |referred |to |as |a |distribution?
Answers
Which |of |the |following |is |a |power |connector |used |by |graphics |cards?
PCI-E
3 |multiple |choice |options
Which |key |combination |can |be |used |to |send |an |interrupt |signal |to |most |applications |running |
in |the |Linux |terminal |to |stop |applications |execution?
CTRL |+ |C
3 |multiple |choice |options
When |a |laaS |model |is |employed, |which |layer |of |the |stack |will |be |managed |by |the |customer?
Operating |system
3 |multiple |choice |options
Which |of |the |following |Linux |commands |will |displayu |the |files |in |the |current |directory?
ls |-l
3 |multiple |choice |options
An |alert |indicated |that |a |compromised |host |was |used |by |an |attacker |to |run |the |command |
below. |What |is |the |attacker |attempting |to |accomplish?
$ |nmap |-sS |192.168.10.0/24
Identify |services |running |on |a |network |hosts
3 |multiple |choice |options
In |Git, |which |of |the |following |allows |work |on |specific |features |to |occur |independently?
Branch
3 |multiple |choice |options
, How |can |a |directory |traversal |vulnerability |be |mitigated?
Use |an |index
3 |multiple |choice |options
What |step |should |be |taken |to |prevent |CSRF |flaws?
Replace |HTTP |cookies |with |additional |session |tracking |methods
3 |multiple |choice |options
How |is |data |handled |on |the |stack |in |an |assembly |program?
First |in, |last |out
3 |multiple |choice |options
What |Windows |configuration |utility |can |be |used |by |a |local |administrative |user |to |create |an |
account |which |requires |the |password |to |be |reset |upon |first |login?
Local |User |Management |Console
3 |multiple |choice |options
Which |Windows |protection |mechanism |displays |a |warning |when |an |application |is |attempting |
to |run |under |elevated |privileges?
User |Account |Control
3 |multiple |choice |options
Which |of |the |following |data |types |is |most |closely |associated |with |network |forensics?
SIEM |logs
3 |multiple |choice |options
Which |of |the |following |VIM |commands |will |save |your |changes |to |a |file |and |exit |the |editor?
:x
3 |multiple |choice |options
How |can |a |new |user |be |added |to |the |system |with |the |Windows |command |line?
net |user/add |user1 |p@ssw0rd
3 |multiple |choice |options
Which |operating |system |kernel |is |referred |to |as |a |distribution?