
Question 142. Which of the following is often one of the most overlooked areas of security? A. Operational B. Technical C. Internet D. Physical Answer 142. Option D. Explanation: Physical security is one…
Read more
Question 95. What is the Ping of Death? A. Sending packets that, when reassembled, are too large for the system to understand B. Sending very large packets that cause a buffer overflow C….
Read more
Question 48. What is the process of hiding text within an image called? A. Steganography B. Encryption C. Spyware D. Keystroke logging Answer 48. Option A. Explanation: Steganography is the process of hiding…
Read more
Question 1. Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker Answer 1. Option A. Explanation: A white-hat…
Read more
The below questions and answers are designed to both measure your understanding of the concepts of XSS -Cross Site Scripting Attacks and Prevention. Q1: What is the difference between HTML Injection and XSS?…
Read more
391. Which script is run when X Window starts? A. .xinit B. .xrc C. .startxrc D. .xinitrc Answer – – D Description – The .xinitrc script is run from your home directory when…
Read more
361. You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information? A. man syslog 3 B. man…
Read more
331. Which of the following tools are used when creating a new partition for data storage on a Linux system? A. fdisk B. format C. mkfs D. mount Answer – – A, C…
Read more
301. Which tool can be used to see if a package has been tampered with? A. verify B. md5 C. integ D. md5sum Answer – – D Description – The other commands are…
Read more
271. On a Debian system, which file contains the hostname of the local machine? A. /etc/hosts B. /etc/HOSTS C. /etc/hostname D. /etc/HOSTNAME Answer – – D Description – Debian systems use the /etc/HOSTNAME…
Read more
241. Which option corrects some spelling mistakes when changing directories? A. cdspell B. cdvar C. cdspchk D. spellcd Answer – – A Description – The cdspell shell option can fix some spelling mistakes…
Read more
211. Which lpc command is used to print a job that is currently on hold? A. release B. enable C. restart D. nohold Answer – – A Description – The release command releases…
Read more
181. Which parameter allows syslog to receive network messages? A. -n B. -r C. -m D. -s Answer – – B Description – The syslog -r command is used to allow syslog to…
Read more
151. Which directive in the XF86Config file disables the Ctrl-Alt-Backspace key combination? A. NoZap B. DontZap C. NoExit D. DontExit Answer – – B Description – The other commands do not exist. 152….
Read more
121. Which section of man page documents contains information on standard file formats? A. 1 B. 2 C. 5 D. 8 Answer – – C Description – Man page section 5 contains information…
Read more
91. How many primary and extended partitions are allowed on a hard disk? A. 1 B. 2 C. 3 D. 4 Answer – – D Description – Only four total partitions of primary…
Read more
61. The _______ utility is used to allow a utility to handle more arguments than it normally could. Answer – – xargs Description – The xargs utility allows a command to handle more…
Read more
31. Which of the following is used to end the 408 process without allowing it to exit gracefully? A. kill 408 B. kill –15 408 C. kill –1 408 D. kill –9 408…
Read more
1. Which tool is used to configure a sound card device? A. sndconf B. sndconfig C. soundconf D. soundconfig Answer – – B Description – The sndconfig tool by Red Hat is used…
Read more