Spread the love

1. Which portion of the PuTTY package allows you to perform  file transfers using the  Secure Copy protocol?

  • Pscp.exe
  • Pageant.exe – Not quite. The pageant tool is used by PuTTY to perform SSH authentication — not to perform data copies between computers.
  • Psftp.exe
  • Mstsc.exe

2. What is a protocol implemented by other programs for secure computer-to-computer access?

  • Remote connection
  • SSH
  • SCP
  • PuTTY

3. Which of these gives users a graphical user interface (GUI) to remote computers that have enabled connections from it.

  • Pscp.exe
  • PuTTY
  • RDP
  • SCP

4. Which of the following is a Linux command used to copy files securely between computers on a network?

  • SSH
  • RDP
  • PuTTY
  • SCP

5. What can you use to give access to files to a group of users as an alternative to transferring files from one computer to another?

  • A shared folder
  • Mstsc.exe
  • A remote connection
  • SSH

6. If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?

  • Application and Services
  • Security
  • System

7. In what log files can you find information about bootup errors? Select all that apply.

  • /var/log/auth.log
  • /var/log/mail.log
  • /var/log/kern.log
  • /var/log/syslog

8. In what log files can you find information about authentication errors?

  • /var/log/auth.log
  • /var/log/kern.log
  • /var/log/syslog
  • /var/log/mail.log

9. For an ssh connection to work, which of the following need to be true? Check all that apply.

  • SSH is installed on client.
  • The SSH server is running on the host you want to connect to.
  • VPN needs to be set up.
  • You need to specify a hostname to SSH into.

10. What command do you use to view error logs in real time?

  • Less var/log/syslog
  • /var/log/auth.log
  • -kill
  • Tail -f

11. Which of the following can be used to connect securely to a remote computer? (Choose all that apply)

  • An SSH client
  • A VPN connection
  • An SSD client
  • A dynamic-link library

12. What happens when you type the following command in the Powershell command line: putty.exe -ssh alex-chi@104.131.122.215 22?

  • You will establish a chat connection with someone called “auser”
  • You will establish a chat connection with someone called “auser”
  • Your computer connects to an SSH located at IP address 104.131.122.215
  • You will search for a user called “alex-chi” logged into your local area network

13. Which of the following is the Windows command line tool that enables file sharing from the CLI?

  • share file
  • net share
  • file share
  • share to net

14. What is Virtual Box?

  • A cloud-based file hosting service
  • A virtual machine
  • Software for managing virtual instances
  • A VPN network

15. Is it possible to run a virtual instance with Linux on a physical machine that is running Windows?

  • Maybe
  • No
  • Yes

16. What Windows application stores events logged by the operating system?

  • LogOS View
  • Event Viewer
  • Powershell
  • SLogGUI

17. In Linux, which of the following log files usually contains the most comprehensive list of events?

  • The /var/log/kern.log file
  • The /var/log/uber.log file
  • The /var/log/dmesg file
  • The /var/log/syslog file

18. Which of the following commands can be used to observe your syslog in real time?

  • tail -f /var/log/syslog
  • run -l /var/log/syslog
  • view -rt /var/log/syslog
  • rtview /var/log/syslog

19. What is disk cloning used for? Select two that apply.

  • To image a computer system
  • To copy files from remote computers using the Secure Copy protocol (SCP)
  • To set up a remote desktop
  • To back up a machine

20. What is the difference between using SCP and other methods of file transfer?

  • SCP is less resource intensive than an email
  • SCP encrypts a flash drive for transfer
  • SCP uses SSH to transfer data
  • There is no difference

21. Which of the following programs is a popular SSH tool for Linux operating systems?

  • PuTTY
  • LinuxSSH
  • GoSSH
  • OpenSSH

22. What does the PuTTY pscp.exe tool do?

  • It creates a virtual machine on your Windows desktop.
  • It creates a virtual private network.
  • It launches the Remote Desktop Protocol (RDP) client in Windows.
  • It lets you copy files to and from remote computers.

23. What is one benefit of using a virtual machine vs a physical one?

  • Virtual machines don’t require passwords
  • Multiple users can use one virtual machine
  • Virtual machines are free to use on the cloud
  • It’s very simple to change virtual hardware resource allocation

24. Alex is trying to start an Ubuntu virtual machine for the first time. They’ve already installed Virtual Box on their Windows computer, which of the following is a good next step?

  • Download the Ubuntu OS image
  • Restart the virtual instance
  • Download a Windows OS image
  • Add more physical RAM

25. You’ve found a log file with a long list of errors in it. Where in the log would be a good place to start searching for the problem?

  • The top
  • The middle
  • The bottom

26. What remote connection tool is built into the command line after PuTTY is installed on a Windows computer?

  • PuTTYPwrShell
  • PuTTYcmd
  • Plink
  • Premote

27. What is a virtual instance?

  • A program for creating virtual machines
  • A virtual machine that has been copied
  • A virtual machine that only runs in the CLI
  • A single virtual machine

28. In Linux, what type of messages are stored in the /var/log/dmesg file?

  • Diagnostic messages
  • System messages
  • System startup messages
  • Direct messages

29. What is a benefit of cloning a hard drive versus installing from installation media?

  • A cloned drive is more secure
  • Cloned drives will last longer
  • Installing from installation media is more resource intensive
  • The cloned drive also includes settings and folders

30. When using the SCP command, what information will you need to complete the transfer? (Choose all that apply)

  • Source hostname
  • Destination IP address
  • Destination user
  • Source IP address

31. What does SSH stand for?

  • Secure Shell
  • Single Server Hold
  • Secure Service Handler
  • Solid State Handshake

32. Which of the following is needed to virtualize an instance of Ubuntu the first time? (Choose all that apply)

  • A physical host machine
  • Software for installing an OS image
  • An image of Ubuntu
  • A Windows host system

33. What Windows application stores events logged by the operating system?

  • Event Viewer
  • SLogGUI
  • LogOS View
  • Powershell

34. It is important that log are regularly cleaned out to make room for new ones. In  Linux, what utility manages this?

  • logswap
  • cleanlog
  • logrotate
  • delnewlog

35. What happens when you type the following command in the Linux command line: sudo dd if=/dev/sdd of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.

  • You will create an image file on your desktop
  • You will create a file called “100M.”
  • You will make a copy of all data located on an sdd device.
  • You will delete a file called “USBcopy.imge.”

36. What is the Microsoft Terminal Services Client used for?

  • Enabling terminal connections on a remote computer.
  • Locating terminals running on a computer.
  • Creating RDP connections to remote computers.
  • Connecting with Linux computers outside of the local network.

37. What is one reason you might avoid sharing a folder with everyone on your network in Windows?

  • It means your computer always needs to be on.
  • It’s resource intensive.
  • It removes anything you’ve already placed in the folder.
  • It’s not very secure

38. In the Windows Event viewer, what is the highest logging level for an event?

  • Top
  • Critical
  • Warning
  • High

39. What event grouping can be used in the Windows Event Viewer to filter specific types of events?

  • Filter Views
  • Custom Views
  • Error View
  • Sorted Logs

40. You’re working on a  computer, but the log doesn’t show any clear errors. Where in the log would be a good place to start searching for the problem?

  • The bottom
  • The top
  • The middle

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *