Gfact practice
Study online at https://quizlet.com/_fm9zls
1. Which of the following is a power connector used by PCI-E
graphics cards?
2. Which key combination can be used to send an inter- CTRL + C
rupt signal to most applications running in the Linux
terminal to stop applications execution?
3. When a laaS model is employed, which layer of the Operating system
stack will be managed by the customer?
4. Which of the following Linux commands will displayu ls -l
the files in the current directory?
5. An alert indicated that a compromised host was used Identify services running
by an attacker to run the command below. What is the on a network hosts
attacker attempting to accomplish?
$ nmap -sS 192.168.10.0/24
6. In Git, which of the following allows work on specific Branch
features to occur independently?
7. How can a directory traversal vulnerability be mitigat- Use an index
ed?
8. What step should be taken to prevent CSRF flaws? Replace HTTP cookies with
additional session tracking
methods
9. How is data handled on the stack in an assembly pro- First in, last out
gram?
10. Local User Management
Console
1/8
, Gfact practice
Study online at https://quizlet.com/_fm9zls
What Windows configuration utility can be used by a
local administrative user to create an account which
requires the password to be reset upon first login?
11. Which Windows protection mechanism displays a User Account Control
warning when an application is attempting to run un-
der elevated privileges?
12. Which of the following data types is most closely asso- SIEM logs
ciated with network forensics?
13. Which of the following VIM commands will save your :x
changes to a file and exit the editor?
14. How can a new user be added to the system with the net user/add user1
Windows command line? p@ssw0rd
15. Which operating system kernel is referred to as a dis- Linux
tribution?
16. What will be the result of changing file permissions The users in the STAFF
for the file "script.sh" to 664 using the Linux chmod group will be able to
command? change the name of the
file.
user@SANS:~/GFACT $ ls -l
total 0
-rwxr--r-- 1 SANS STAFF 0 24 Nov 09:31 script.sh
17. How do prepared statements help prevent SQL injec- Query language is kept
tion attacks? separate from user sup-
plied data
2/8
Study online at https://quizlet.com/_fm9zls
1. Which of the following is a power connector used by PCI-E
graphics cards?
2. Which key combination can be used to send an inter- CTRL + C
rupt signal to most applications running in the Linux
terminal to stop applications execution?
3. When a laaS model is employed, which layer of the Operating system
stack will be managed by the customer?
4. Which of the following Linux commands will displayu ls -l
the files in the current directory?
5. An alert indicated that a compromised host was used Identify services running
by an attacker to run the command below. What is the on a network hosts
attacker attempting to accomplish?
$ nmap -sS 192.168.10.0/24
6. In Git, which of the following allows work on specific Branch
features to occur independently?
7. How can a directory traversal vulnerability be mitigat- Use an index
ed?
8. What step should be taken to prevent CSRF flaws? Replace HTTP cookies with
additional session tracking
methods
9. How is data handled on the stack in an assembly pro- First in, last out
gram?
10. Local User Management
Console
1/8
, Gfact practice
Study online at https://quizlet.com/_fm9zls
What Windows configuration utility can be used by a
local administrative user to create an account which
requires the password to be reset upon first login?
11. Which Windows protection mechanism displays a User Account Control
warning when an application is attempting to run un-
der elevated privileges?
12. Which of the following data types is most closely asso- SIEM logs
ciated with network forensics?
13. Which of the following VIM commands will save your :x
changes to a file and exit the editor?
14. How can a new user be added to the system with the net user/add user1
Windows command line? p@ssw0rd
15. Which operating system kernel is referred to as a dis- Linux
tribution?
16. What will be the result of changing file permissions The users in the STAFF
for the file "script.sh" to 664 using the Linux chmod group will be able to
command? change the name of the
file.
user@SANS:~/GFACT $ ls -l
total 0
-rwxr--r-- 1 SANS STAFF 0 24 Nov 09:31 script.sh
17. How do prepared statements help prevent SQL injec- Query language is kept
tion attacks? separate from user sup-
plied data
2/8