Given the following netstat output, which three statements about the local machine are true? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Given the following netstat output, which three statements about the local machine are true? (Choose three.) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp 0…

Continue ReadingGiven the following netstat output, which three statements about the local machine are true? (Choose three.)

What is the most efficient Linux command for determining whether there is a running process named runme?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the most efficient Linux command for determining whether there is a running process named runme? netstat –a > runme netstat –a < runme netstat –a | grep runme…

Continue ReadingWhat is the most efficient Linux command for determining whether there is a running process named runme?

An administrator believes that an attacker is overwhelming a database server by causing intensive queries to be run. Which log file should the administrator check first?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

An administrator believes that an attacker is overwhelming a database server by causing intensive queries to be run. Which log file should the administrator check first? /var/log/mysql/mysql.log /var/log/mysql/mysql_error.log /var/log/mysql/mysql_warning.log /var/log/mysql/mysql-slow.log…

Continue ReadingAn administrator believes that an attacker is overwhelming a database server by causing intensive queries to be run. Which log file should the administrator check first?

What netstat command would best allow an administrator to determine the service responsible for a listening socket?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What netstat command would best allow an administrator to determine the service responsible for a listening socket? sudo netstat -tn sudo netstat -lnp netstat -tn netstat lnp Explanation & Hint: The netstat…

Continue ReadingWhat netstat command would best allow an administrator to determine the service responsible for a listening socket?

What statement best describes the process that can be used to edit the windows registry?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What statement best describes the process that can be used to edit the windows registry? You cannot manually edit the registry. Run the regedit command from the command line. Double-click the task…

Continue ReadingWhat statement best describes the process that can be used to edit the windows registry?

Which one of the following best describes the output that the netstat command displays?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which one of the following best describes the output that the netstat command displays? all the active mapped network drives all the active connected users on the device all the active TCP…

Continue ReadingWhich one of the following best describes the output that the netstat command displays?

What is required for a Windows user to perform a task with administrator-level access?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is required for a Windows user to perform a task with administrator-level access? use the “Run as Administrator” option enter the kernel mode boot the system into the safe…

Continue ReadingWhat is required for a Windows user to perform a task with administrator-level access?

According to the output shown below, what did the user do? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

According to the output shown below, what did the user do? (Choose two.) Configured the system to require digital signing only of externally-downloaded PowerShell scripts Changed the PowerShell execution policy…

Continue ReadingAccording to the output shown below, what did the user do? (Choose two.)

Which Windows structure is used to map each process virtual address into the corresponding physical address?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Windows structure is used to map each process virtual address into the corresponding physical address? route table memory table page table  cache table CPU table Explanation & Hint: The…

Continue ReadingWhich Windows structure is used to map each process virtual address into the corresponding physical address?

Which one of the following options is most likely to provide fair and accurate information about operating systems and their known vulnerabilities?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which one of the following options is most likely to provide fair and accurate information about operating systems and their known vulnerabilities? www.cisco.com www.microsoft.com www.apple.com nvd.nist.gov Explanation & Hint: The…

Continue ReadingWhich one of the following options is most likely to provide fair and accurate information about operating systems and their known vulnerabilities?

Which two statements are true about Windows operating systems? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:4 mins read

Which two statements are true about Windows operating systems? (Choose two.) Windows operating systems are used exclusively for desktop computing. Windows server platforms offer numerous services. Some Windows operating systems…

Continue ReadingWhich two statements are true about Windows operating systems? (Choose two.)

Which two of the following options are ways to launch the Windows Task Manager application? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two of the following options are ways to launch the Windows Task Manager application? (Choose two.) In the Windows Start menu, type Go Task Manager. Right-click the taskbar and choose…

Continue ReadingWhich two of the following options are ways to launch the Windows Task Manager application? (Choose two.)

Which two of the following statements are true about Windows virtual memory? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two of the following statements are true about Windows virtual memory? (Choose two.) Virtual memory combines the RAM memory with the hard disk space to compensate for lack of…

Continue ReadingWhich two of the following statements are true about Windows virtual memory? (Choose two.)

Microsoft has operating systems that are targeted for which two kinds of devices? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Microsoft has operating systems that are targeted for which two kinds of devices? (Choose two.) servers network routers network switches personal printers personal computers Explanation & Hint: Microsoft offers operating…

Continue ReadingMicrosoft has operating systems that are targeted for which two kinds of devices? (Choose two.)

Which Windows registry hive would be used to track the history of USB storage devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Windows registry hive would be used to track the history of USB storage devices? HKEY_LOCAL_MACHINE (HKLM) HKEY_CURRENT_USER (HKCU) HKEY_CLASSES_ROOT (HKCR) HKEY_CURRENT_CONFIG (HKCC) Explanation & Hint: To track the history…

Continue ReadingWhich Windows registry hive would be used to track the history of USB storage devices?

What can be used to make a malicious file to appear to have 0 byte size in the dir command output?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What can be used to make a malicious file to appear to have 0 byte size in the dir command output? using AES to encrypt the file using winzip to compress the…

Continue ReadingWhat can be used to make a malicious file to appear to have 0 byte size in the dir command output?

Why is malware that runs as a Windows service more difficult for the average end user to detect?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Why is malware that runs as a Windows service more difficult for the average end user to detect? because services run in the background and do not interact with the…

Continue ReadingWhy is malware that runs as a Windows service more difficult for the average end user to detect?