Which of the following is a power connector used by
PCI-E
graphics cards?
Which key combination can be used to send an interrupt
signal to most applications running in the Linux terminal CTRL + C
to stop applications execution?
When a laaS model is employed, which layer of the stack
Operating system
will be managed by the customer?
Which of the following Linux commands will displayu the
ls -l
files in the current directory?
An alert indicated that a compromised host was used
by an attacker to run the command below. What is the
attacker attempting to accomplish? Identify services running on a network hosts
$ nmap -sS 192.168.10.0/24
In Git, which of the following allows work on specific
Branch
features to occur independently?
How can a directory traversal vulnerability be mitigated? Use an index
Replace HTTP cookies with additional session tracking
What step should be taken to prevent CSRF flaws?
methods
How is data handled on the stack in an assembly program? First in, last out
What Windows configuration utility can be used by a local
administrative user to create an account which requires Local User Management Console
the password to be reset upon first login?
Which Windows protection mechanism displays a warn-
ing when an application is attempting to run under ele- User Account Control
vated privileges?
Which of the following data types is most closely associ-
SIEM logs
ated with network forensics?
, Which of the following VIM commands will save your
:x
changes to a file and exit the editor?
How can a new user be added to the system with the
net user/add user1 p@ssw0rd
Windows command line?
Which operating system kernel is referred to as a distrib-
Linux
ution?
What will be the result of changing file permissions for the
file "script.sh" to 664 using the Linux chmod command?
user@SANS:~/GFACT $ ls -l The users in the STAFF group will be able to change the
name of the file.
total 0
-rwxr--r-- 1 SANS STAFF 0 24 Nov 09:31 script.sh
How do prepared statements help prevent SQL injection
Query language is kept separate from user supplied data
attacks?
What is a use of a Load Balancer? Redistributing traflc across containers
Which protocol is for sending emails? SMTP
Which type of algorithm is used to embed a hidden mes-
Least Significant Bit
sage into a media file?
Volatillity's dumpfiles command is used for which pur-
Acquiring file objects from a memory capture
pose?
When using object-based cloud storage, how is data re-
Sending an API call over a GET request
trieved?
Which of the following Linux folders would be a logical
/media
mount locations for a USB flash drive?
What is a weakness of a symmetric encryption algorithm
Key exchange
like AES
2/6