Group policy object
Give this one a try later!
is a collection of Group Policy settings that defines what a system will look
like and how it will behave for a defined group of users. A Group Policy is
the primary administrative tool for defining and controlling how programs,
network resources, and the operating system operate for users and
computers in an organization.
host-based intrusion detection system (HIDS)
Give this one a try later!
, s a device or software application that monitors a system for malicious
activity or policy violations. Any malicious activity or violation is typically
reported to an administrator or collected centrally using a security
information and event management system.
Single-factor authentication (SFA)
Give this one a try later!
is a process for securing access to a given system, such as a network or
website, that identifies the party requesting access through only one
category of credentials (something you know, something you have,
something you are, something you do, or somewhere you are). The most
common example of single-factor authentication occurs when a user is
prompted to enter their username and password to authenticate.
nano utility
Give this one a try later!
is an easy-to-use command-line text editor for Linux systems. Nano
includes the functionality of a regular text editor, as well as syntax
highlighting, multiple buffers, search and replace with regular expression
support, spellchecking, UTF-8 encoding, and more.
Wireless Access Points (WAP)
Give this one a try later!
, can utilize MAC filtering to ensure only known network interface cards are
allowed to connect to the network. If the hacker changes their MAC
address to a trusted MAC address, they can easily bypass this security
mechanism. MAC filtering is considered a good security practice as part of
a larger defense-in-depth strategy, but it won't stop a skilled hacker for
long.
You have connected your laptop to the network using a CAT 5e cable but received
an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is
most likely the cause of this issue?
Give this one a try later!
DHCP failure
proxy server
Give this one a try later!
is a web server that acts as a gateway between a client application. A
malicious actor could have reconfigured this user's web browser to use a
particular proxy server in a foreign country to conduct a man-in-the-middle
attack. An anti-malware scanner would not detect this since the use of a
proxy server could also be for legitimate purposes. In fact, most large
companies use their own proxy servers that users connect to when using
the internet.
cp command
Give this one a try later!
, is a command-line utility for copying files and directories. It supports
moving one or more files or folders with options for taking backups and
preserving attributes. Copies of files are independent of the original file,
unlike the mv command. The cp command will copy your file(s) while the
mv one will move them and delete the original files from the old location.
Dion Training's offices are frequently experiencing brownouts and sags. Which of
the following solutions would protect all of their workstations and servers from
these under-voltage events?
Give this one a try later!
Line conditioner
The file allocation table 32-bit (FAT32)
Give this one a try later!
is the 32-bit file system supported by Windows, macOS, and Linux
computers. FAT32 can support maximum volume sizes of up to 2 TB and
maximum file sizes of up to 4 GB.
GDPR (General Data Protection Regulation)
Give this one a try later!
is a regulation created in the European Union that creates provisions and
requirements to protect the personal data of European Union (EU) citizens.
Transfers of personal data outside the EU Single Market are restricted
Give this one a try later!
is a collection of Group Policy settings that defines what a system will look
like and how it will behave for a defined group of users. A Group Policy is
the primary administrative tool for defining and controlling how programs,
network resources, and the operating system operate for users and
computers in an organization.
host-based intrusion detection system (HIDS)
Give this one a try later!
, s a device or software application that monitors a system for malicious
activity or policy violations. Any malicious activity or violation is typically
reported to an administrator or collected centrally using a security
information and event management system.
Single-factor authentication (SFA)
Give this one a try later!
is a process for securing access to a given system, such as a network or
website, that identifies the party requesting access through only one
category of credentials (something you know, something you have,
something you are, something you do, or somewhere you are). The most
common example of single-factor authentication occurs when a user is
prompted to enter their username and password to authenticate.
nano utility
Give this one a try later!
is an easy-to-use command-line text editor for Linux systems. Nano
includes the functionality of a regular text editor, as well as syntax
highlighting, multiple buffers, search and replace with regular expression
support, spellchecking, UTF-8 encoding, and more.
Wireless Access Points (WAP)
Give this one a try later!
, can utilize MAC filtering to ensure only known network interface cards are
allowed to connect to the network. If the hacker changes their MAC
address to a trusted MAC address, they can easily bypass this security
mechanism. MAC filtering is considered a good security practice as part of
a larger defense-in-depth strategy, but it won't stop a skilled hacker for
long.
You have connected your laptop to the network using a CAT 5e cable but received
an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is
most likely the cause of this issue?
Give this one a try later!
DHCP failure
proxy server
Give this one a try later!
is a web server that acts as a gateway between a client application. A
malicious actor could have reconfigured this user's web browser to use a
particular proxy server in a foreign country to conduct a man-in-the-middle
attack. An anti-malware scanner would not detect this since the use of a
proxy server could also be for legitimate purposes. In fact, most large
companies use their own proxy servers that users connect to when using
the internet.
cp command
Give this one a try later!
, is a command-line utility for copying files and directories. It supports
moving one or more files or folders with options for taking backups and
preserving attributes. Copies of files are independent of the original file,
unlike the mv command. The cp command will copy your file(s) while the
mv one will move them and delete the original files from the old location.
Dion Training's offices are frequently experiencing brownouts and sags. Which of
the following solutions would protect all of their workstations and servers from
these under-voltage events?
Give this one a try later!
Line conditioner
The file allocation table 32-bit (FAT32)
Give this one a try later!
is the 32-bit file system supported by Windows, macOS, and Linux
computers. FAT32 can support maximum volume sizes of up to 2 TB and
maximum file sizes of up to 4 GB.
GDPR (General Data Protection Regulation)
Give this one a try later!
is a regulation created in the European Union that creates provisions and
requirements to protect the personal data of European Union (EU) citizens.
Transfers of personal data outside the EU Single Market are restricted