Commands
1102 security
1101
NET+
Sec+
100

Windows command that list all files and folders

A:ls

B:MkDIR

c:Dir

D:List

C:DIR

100

The Windows command-line utility is used to followthe route a packet of information takes to get to its target. It uses ICMP status messages. Returns details of the route taken to find the machine or device with the IP address listed in the command 

A:Ping

B:Traceroute

C:TraceRT

D:ICMP

C: TraceRT

100

Ram sticks used in smaller devices such as laptop computers and some printers. 

A: DIMM

B:ROMM

C:SoDIMM
D:RAM

C: SODIMM

100

A Network engineer is wanting to select a 802.11 standard that is going to give him 54mbps but goes through walls really well. which standard would he pick?

A: 802.11a

B:802.11b

C:802.11ac

D:802.11g


D:802.11g

100

Role that manages day to day date usage in a data center

A: Data owner

B: Data steward

C: Data custodian

D:Data Manager 

B: Data steward

200

A utility commonly used in windows for troubleshooting DNS problems; sends a request (query) to the DNS server to change a FQDN into an IP address, verifying if you are able to resolve an address and what addresses you are receiving from what DNS server

A:DIG

B:Netstat

C:Nslookup

D:Ipconfig

C:Nslookup

200

This malware is self-propagating and self spreading. It may carry a payload, or just eat up resources. 

A: Virus

B:RAT

C:Worm

D:Trojan

C: Worm

200

The current standard for attaching internal storage drives to a desktop PC. 

A:SATA

B:Molex

C:PATA

D:SCSI

A: SATA

200

What is the IEEE standard for POE+

A: 802.3bt

B: 802.11at

C: 802.3af

D: 802.3at

D: 802.3at

200

This type of firewall filters traffic based on the combined functionality of all of the other firewall types.

A: Stateful

B: Proxy

C:WAP

D:NGFW

D: NGFW

300

A Windows command to refresh local group policies as well as group policies set in Active Directory. 

A:Gpresult

B:LocalGroup

C:Cat

D: Gpupdate

D:Gpupdate

300

This malware involves installing software that provides or appears to provide a desired function, but also contains malware. 

A: Virus

B:Worm

C:Logic bomb

D:Trojan

D:Trojan

300

Which RAID level uses striping without parity? 

A: RAID 5

B: RAID 0

C:RAID 1

D:RAID 10

B: RAID 0

300

Cell phones based on this technology allow subscribers to use a Subscriber Identity Module (SIM) card to use an unlocked handset with their chosen network provider. This technology is adopted internationally and by AT&T and T-Mobile in the US. 

A:CDMA

B:GLM

C:GSM

D:BSS

C: GSM (Global system for mobile communication) 

300

Discussing the CIA Triad what does the "C".."I".."A" stand for?   

A: confidentiality , Integrity, and Authentication

B: Cybersecurity, Integrity, and Authorization

C: Confidentiality  , Integrity, and Accounting

D: Confidentiality  , Integrity, and Availability 

D:  Confidentiality  , Integrity, and Availability

400

a linux command used to change permissions on files or directories. 

A: Chown

B:Su/Sudo

C:Chmod

D:Perm

C: Chmod

400

An address beginning with 169.254.X.X is this kind of address. AND Why would you get this address

APIPA address, and can not connect to a DHCP server.

400

How many Pins does a PSU have?

A:20+3, 20, 23

B:24, 20 , 20+4

C: 21, 24, 20+6

D:20, 24, 20+8

B: 20, 24, 20+4

400

What are the two types of Coaxial connectors?

A: BNC and FC

B; FC and LC

C: F-type and BNC

D: F-type and APC

C: F-type and BNC

400

Which one is the symmetric algorithm? 

A:DSA

B:RSA

C:AES

D:ElGamal 

C:AES

500

a command used in RedHat Package managment system (RPM) based linux distributions

A: Opt-Get

B: TraceRT

c:Yum

D:RoundRobin

C:Yum

500

This is malware that delays its operation for a time until a certain event, such as a date being reached or a triggering packet or work load threshold is met. 

A:Logic Bomb

B:Virus

C:RootKit

D:RAT

A: Logic bomb

500

what are the 2 functionalities of a CMOS battery?  

Date and Time

and saves the BIOS/UEFI configuration settings.

500

name all the layers of the OSI model!

1.Physical

2.Data-link

3.Network

4.Transport

5.Session

6.Presentation

7.Application

500

what security category focuses on the policies, procedures, and overall management of security within an organization. This involves strategic planning, risk assessment, security awareness and training, incident response planning, and compliance with legal and regulatory requirements?

Managerial