- Ethical Hacking Statement
- The Modern Security Operations Center
- The Windows Operating System
- Linux Basics
- Network Protocols
- Ethernet and IP Protocol
- Connectivity Verification
- Address Resolution Protocol
- The Transport Layer
- Network Services
- Network Communication Devices
- Network Security Infrastructure
- Attackers and Their Tools
- Common Threats and Attacks
- Network Monitoring and Tools
- Attacking the Foundation
- Attacking What We Do
- Understanding Defense
- Access Control
- Threat Intelligence
- Public Key Cryptography
- EndPoint Protection
- Endpoint Vulnerability
- Technologies and Protocols
- Network Security Data
- Evaluating Alerts
- Working with Network Security Data
- Digital Forensics and Incidents Analysis and response
1. When a user makes changes to the settings of a Windows system, where are these changes stored?
- A. Control panel
- B. Registry
- C. win.ini
- D. boot.ini
The registry contains information about applications, users, hardware, network settings, and file types. The registry also contains a unique section for every user, which contains the settings configured by that particular user.
2. Which user account should be used only to perform system management and not as the account for regular use?
- A. standard user
- B. guest
- C. power user
- D. administrator
The administrator account is used to manage the computer and is very powerful. Best practices recommend that it be used only when it is needed to avoid accidentally performing significant changes to the system.
3. Which command is used to manually query a DNS server to resolve a specific host name?
- A. net
- B. tracert
- C. nslookup
- D. ipconfig /displaydns
The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.
4. For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
- A. smartcard settings
- B. firewall settings
- C. MAC address settings
- D. file system settings
Smartcard and file system settings do not affect network operation. MAC address settings and filtering may be used to control device network access but cannot be used to filter different data traffic types.
5. What contains information on how hard drive partitions are organized?
- A. BOOTMGR
- B. Windows Registry
- C. CPU
- D. MBR
6. What utility is used to show the system resources consumed by each user?
- A. Task Manager
- B. User Accounts
- C. Device Manager
- D. Event Viewe
The Windows Task Manager utility includes a Users tab from which the system resources consumed by each user can be displayed.
7. What term is used to describe a logical drive that can be formatted to store data?
- A. volume
- B. track
- C. sector
- D. cluster
- E. partition
Hard disk drives are organized by several physical and logical structures. Partitions are logical portions of the disk that can be formatted to store data. Partitions consist of tracks, sectors, and clusters. Tracks are concentric rings on the disk surface. Tracks are divided into sectors and multiple sectors are combined logically to form clusters.
8. How much RAM is addressable by a 32-bit version of Windows?
- A. 4 GB
- B. 8 GB
- C. 16 GB
- D. 32 GB
A 32-bit operating system is capable of supporting approximately 4 GB of memory. This is because 2^32 is approximately 4 GB.
9. Which net command is used on a Windows PC to establish a connection to a shared directory on a remote server?
- A. net use
- B. net start
- C. net share
- D. net session
The net command is a very important command in Windows. Some common net commands include the following:
- net accounts – sets password and logon requirements for users
- net session – lists or disconnects sessions between a computer and other computers on the network
- net share – creates, removes, or manages shared resources
- net start – starts a network service or lists running network services
- net stop – stops a network service
- net use – connects, disconnects, and displays information about shared network resources
- net view – shows a list of computers and network devices on the network.
10. What is the purpose of the cd command?
- A. changes directory to the previous directory
- B. changes directory to the root directory
- C. changes directory to the next highest directory
- D. changes directory to the next lower directory
CLI commands are typed into the Command Prompt window of the Windows operating system. The cd command is used to change the directory to the Windows root directory.