Display file contents on the terminal.
cat
Establish a secure encrypted connection between two hosts over an insecure network
ssh
Linux files are stored in _______.
directories
Files and directories are organized in a tree-like structure with a root directory at the top, allowing for nested subdirectories
Hierarchical structure
_____ is the main application to customize and manage Windows settings.
Settings
enter global configuration mode
configure terminal
display interface designations, IP address and status
show ip interface brief
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:
SSH
What is the first thing you must do once you sign into your image?
Open and read the readme file.
Print text or variables in the terminal.
echo
Removes a running process from memory.
kill
Linux filesystem tree: Base or trunk of the tree is the _____.
root directory
Represented by a backslash (\), this is the starting point for navigating the file system.
Root directory
_____ is an application that serves as a system monitor and startup manager for Windows, providing insights into your device's performance and resource consumption.
Task Manager
configure the NAME of the Router or Switch
hostname NAME
display routing table
show ip route
This refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS
What is the first thing you do to and operating system unless told otherwise.
Update the operating system.
Get the full path to a command's executable file.
which
Display active processes.
ps
Branches of the Linux filesystem tree are _____.
directories
A complete path to a file specifies each directory in the hierarchy, separated by backslashes, starting from the root directory.
Directory paths
The _____ _____ console is a Microsoft Management Console (MMC) snap-in that provides a centralized location for managing various system components, services, and settings on Windows.
Computer Management
set minimum password length
security passwords min-length
on switch - show what VLANs exist, names, ports assigned
show vlan brief
This provides an alternative solution to the manual allocation of IP addresses?
DHCP
What is Microsoft's minimum password length guideline?
8 characters
Change to another directory.
cd
Superuser Do
sudo
–Leaves of the Linux filesystem tree are _____.
files
Windows has rules regarding file names, including character limitations and restrictions on certain characters.
File naming conventions
The _____ _____ is a Microsoft Management Console (MMC) snap-in that you can use to view and manage event logs.
Event Viewer
encrypt all passwords – except secret
service password-encryption
display the running configuration - active
show running-config
This refers to a network protocol used for synchronizing clocks over a computer network?
NTP
What is the most important rule about creating passwords for Windows or Linux.
Ban common passwords.
Locate a file or directory by name.
find
Package Manager
apt-get
Linux commands, files, and directory names are _____ _____.
case sensitive
The primary file system on modern Windows, offering features like security permissions, data compression, and journaling for reliability.
NTFS (New Technology File System)
The _____ _____ is a feature that's been part of Windows for a long time. It provides a centralized location to view and manipulate system settings and controls.
Control Panel
suppress DNS attempt when a command is mistyped
no ip domain-lookup
what routing protocol, which networks, passive interfaces, neighbors
show ip protocol
This is the name of a network protocol that secures web traffic via SSL/TLS encryption?
HTTPS
What are the three types of characters required for password creation?
Uppercase
Lowercase
Non-alphanumeric
Search for a string within an output.
grep
Display the user ID.
whoami
_____ are sequenced lists of commands that allow users to send multiple commands at once.
Scripts
The ______ _____ is a critical component of the Windows operating system. It contains essential system files and libraries necessary for the proper functioning of the operating system.
System Directory
This provides options to customize the startup process, including the ability to enable or disable software, control startup services, and access other advanced system settings.
System Configuration
create a MESSAGE that will display when logging in
banner motd
which IOS, capability, memory, configuration-register
show version
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
Phishing
What is the standard maximum password age for users for a Windows password?
90 days
List the contents of a directory.
ls
Create Empty File
touch
_____ is the tool used to access the Ubuntu Command Line.
Terminal
A _____ _____ is the unique address that specifies the location of a file or directory within the Windows directory structure.
file path
This is a system utility that provides a comprehensive view of the hardware, system components, and software environment on a Windows device.
System Information
leave interface config and return to global config
Exit
show routing table entries learned through OSPF
show ip route ospf
The practice of using a telephone system to manipulate user into disclosing confidential information is known as:
Vishing
What is the minimum password age for a Windows password?
10-30 days
Get the name of the present working directory.
pwd
Change Mode
chmod
The Linux Administrator account
Root
The _____ _____ is a built-in Windows tool that provides a graphical interface to navigate through the directory structure.
File Explorer
The _____ _____ is a powerful tool used to view and modify the system registry.
Registry Editor
turn the interface on
no shutdown
shows active processes running on router
show processes
Which of the following answers refers to a social engineering attack that exploits SMS or text messages to deceive recipients into taking harmful actions, such as revealing sensitive information or clicking malicious links?
Smishing
Enabled
Access manual pages for all Linux commands.
man
Change Owner
chown
system configuration files.
/etc
The _____ _____ is a command-line interface that allows users to interact with the system through text commands.
Command Prompt (CMD)
The _____ _____ _____ _____ is a Microsoft Management Console (MMC) snap-in that provides a single user interface through which all the settings of local group policy object can be managed.
Local Group Policy Editor
make the user level password ‘PASSWORD’
password PASSWORD
shows cpu statistics
show process cpu
Which type of social engineering attack relies on identity fraud?
Impersonation
Disabled
Get information about network connections and more.
netstat
Display Date and Time
date
log files.
/var
An _____ _____ _____ provides the complete path from the root directory to the target file or directory.
absolute file path
_____ _____ _____ is a system utility that you can use to access and modify settings that are not typically available in Settings or Control Panel.
Advanced System Settings
a mode in which a user has elevated access to a device and can perform a wide range of actions
Privileged exec mode
shows memory allocation
show memory
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called:
Ransomware
What is the Account Lockout Duration during Windows hardening?
30 minutes