ls
Give this one a try later!
command lists the files or directories in the current path of a Unix, Linux, or
Mac operating system. When invoked without any arguments, ls lists the
files in the current working directory.
botnet
Give this one a try later!
, is a network of computers that have been compromised by a Trojan, rootkit,
or worm malware. This workstation would then attempt to flood the victim's
computer with requests over the network. These requests would require
CPU and network resources to make, causing the utilization to rise to 95-
100% resource utilization. Since Microsoft Word can run macros, it is
possible it has become infected and is now part of a larger botnet.
Partitioning
Give this one a try later!
is the act of dividing a physical disk into logically separate storage areas,
often referred to as drives. Each partition can be formatted with any file
system type. Since there are 4 distinct partitions on this single hard drive, it
can support up to 4 different file systems.
Which of the following commands is used on a Linux system to edit a text file on a
server?
Give this one a try later!
vi
Enhanced Open
Give this one a try later!
, enables encryption for traffic being sent and received over a wireless
network when still using open authentication.
Which of the following would a technician use when trying to find the exact steps
required to install a custom software package within their organization?
Give this one a try later!
SOP
Dion Training has configured Windows Defender Firewall on all of its corporate
Windows 10 laptops. When connected to a public network, the firewall has been
configured to allow only inbound connections that match an existing rule and to
only allow outbound connections that do match an existing rule to achieve the
highest level of security. What type of security posture has Dion Training
implemented?
Give this one a try later!
Explicit deny for outbound, explicit deny for inbound
What is the minimum amount of storage space required to install Windows 11 (x64)
on a device?
Give this one a try later!
, 64 GB
Which of the following macOS features is used to backup and restore files to an
external hard disk?
Give this one a try later!
Time Machine
Port 67
Give this one a try later!
is used for DHCP
Susan, an executive at Dion Training, will be traveling to Italy for a conference next
week. She is worried about remaining connected to the internet while overseas and
plans to use the WiFi in her hotel room and the local coffee shop with her laptop.
Which of the following should she purchase and configure before leaving for Italy
to ensure her communications remain secure regardless of where she is connecting
from?
Give this one a try later!
VPN
Give this one a try later!
command lists the files or directories in the current path of a Unix, Linux, or
Mac operating system. When invoked without any arguments, ls lists the
files in the current working directory.
botnet
Give this one a try later!
, is a network of computers that have been compromised by a Trojan, rootkit,
or worm malware. This workstation would then attempt to flood the victim's
computer with requests over the network. These requests would require
CPU and network resources to make, causing the utilization to rise to 95-
100% resource utilization. Since Microsoft Word can run macros, it is
possible it has become infected and is now part of a larger botnet.
Partitioning
Give this one a try later!
is the act of dividing a physical disk into logically separate storage areas,
often referred to as drives. Each partition can be formatted with any file
system type. Since there are 4 distinct partitions on this single hard drive, it
can support up to 4 different file systems.
Which of the following commands is used on a Linux system to edit a text file on a
server?
Give this one a try later!
vi
Enhanced Open
Give this one a try later!
, enables encryption for traffic being sent and received over a wireless
network when still using open authentication.
Which of the following would a technician use when trying to find the exact steps
required to install a custom software package within their organization?
Give this one a try later!
SOP
Dion Training has configured Windows Defender Firewall on all of its corporate
Windows 10 laptops. When connected to a public network, the firewall has been
configured to allow only inbound connections that match an existing rule and to
only allow outbound connections that do match an existing rule to achieve the
highest level of security. What type of security posture has Dion Training
implemented?
Give this one a try later!
Explicit deny for outbound, explicit deny for inbound
What is the minimum amount of storage space required to install Windows 11 (x64)
on a device?
Give this one a try later!
, 64 GB
Which of the following macOS features is used to backup and restore files to an
external hard disk?
Give this one a try later!
Time Machine
Port 67
Give this one a try later!
is used for DHCP
Susan, an executive at Dion Training, will be traveling to Italy for a conference next
week. She is worried about remaining connected to the internet while overseas and
plans to use the WiFi in her hotel room and the local coffee shop with her laptop.
Which of the following should she purchase and configure before leaving for Italy
to ensure her communications remain secure regardless of where she is connecting
from?
Give this one a try later!
VPN