Malware
MS Command-Line Tools
File System Types
SOHO Security
Web Browser
100

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Malware

100

Windows Command Prompt command used to list all directory's files and subdirectories contained in the current directory:

dir or dir *.*

100

A file system developed by Apple for its operating systems?

APFS

100

An application software that selectively blocks access to websites?

Content filter

100

An OS that uses web browser as its main user interface?

ChromeOS

200

Malicious software collecting information about users without their knowledge/consent is called:

Spyware

200

 A command-line utility used for checking the reachability of a remote network host is called:

ping

200

A Microsoft-proprietary file system optimized for flash drives is known as:

exFAT

200

Going into your router settings and disabling this feature makes a WLAN harder to discover:

SSID Broadcast

200

A cloud service provided by a web browser vendor for sharing browser settings and data across all web browser instances installed on devices that are signed-in to the main account (e.g., Google Account, or Microsoft account).

Browser Synchronization

300

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

300

Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions

sfc

300

A file system type specific to Microsoft Windows that offers better compression, increased file size limit, object permissions, disk quotas and encryption

NTFS

300

An optimal Wireless Access Point antenna placement provides a countermeasure against this type of mobile cybersecurity threat

war driving

300

Web caching involves storing copies of web files, like HTML pages or images, on a user's device or intermediary servers which improves what?

Page loading speeds

400

A malware type that exploits computing resources without the owner's consent?

Cryptominer

400

A Command Prompt utility in MS Windows that verifies the file system integrity and fix logical file system errors?

chkdsk

400

ext3 and ext4 are examples of default file systems used by:

Linux distributions

400

On a switch, a packet analyzer can be connected to an empty port and the switch can be configured to pass a copy of the data sent over one or multiple ports on that switch to the packet sniffer port allowing the administrator to monitor contents of the traffic passing through the switch. This is called what?

port mirroring

400

An Internet browser redirecting a user to a website other than intended indicates a security issue related to what?

DNS

500

A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:

Boot sector virus

500

A network command-line utility in MS Windows that tracks and displays the route taken by IP packets on their way to another host is known as:

tracert

500

The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

FAT32

500

A lightly protected subnet (a.k.a. DMZ) consisting of publicly available servers placed on the outside of the company's firewall is called:

Screened Subnet

500

The following symptoms can be used to describe what kind of an attack?

  • A malicious script is injected into a trusted website
  • Exploits the trust a user's web browser has in a website
  • User's browser executes attacker's script

XSS attack

M
e
n
u