We covered requirements and features of 3 operating systems Windows 7, Windows 10 and ……...
What is
Windows 8.1
There are usually 3 models of cloud services to compare. Software as a service (SaaS), Infrastructure as a Service (IaaS) and What?
What is
Platform as a Service (PaaS)
What version of ITIL are IT professionals currently utilizing?
what is
4 or ITIL4
HTTP can be found in what port?
what is
80
On Linux, there are two ways of setting permissions for users and groups; with regular file permissions or with this
what is
Access Control List
Directory service provided by Microsoft. Helps organizations have a central administration over all the activities carried out in their networks.
What is
Active Directory
this practice is essentially about hacking your own system before someone else can
what is
Penetration Testing or Pen Testing
The means by which an organization is directed and controlled
what is
Governance
Port 23
what is
Telnet
Linux startup process is the multi-stage initialization process performed during what?
what is
booting a Linux installation
WAN and LAN are short for what?
What is
Wide Area Network and Local Area Network
______ is traditionally associated as being an operating system for coders and programmers, but over the years there have been real attempts to make it more attractive to general consumers.
what is
LINUX
Recommendations that guide an organization and its people on how to work flexibly in all circumstances
what is
Guiding Principals
DNS system is connected to what port?
what is
Port 53
_____ is an advanced access control mechanism built into most modern Linux distributions
what is
Security Enhanced Linux or SELinux
Data encryption/decryption, Character/string conversion, Data compression and Graphic handling takes place on what layer of the OSI model
What is
layer 6 (Presentation) Layer
Bandwidth Hogs, too many devices, malfunctioning devices and overloaded servers will cause a network to have a_________?
what is
Bottleneck
which dimension focuses on relationships with external factors?
what is
3 or Partners and Suppliers
Port 22
What is
Secure Shell Protocol or SSH
It’s important to have different _________ to obtain higher data security in case if any disaster happens
what is
This specific attack happens when an attacker took the advantages of weakness hidden in the domain name system.
What is
DNS Attack
DDOS Daily Double!!!!!!! Double Points total 1000
_____ _____ is an automated tool that allows organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks
what is
Vulnerability Scanner
This image represents what?
what is
The service value system
Simple Mail Transport Protocol
Port 25
The symbolic mode rwxr-xr-x is equivalent to what numeric mode?
What is
755