1. Which portion of the PuTTY package allows you to perform file transfers using the Secure Copy protocol?
Answers
· Pscp.exe
· Pageant.exe – Not quite. The pageant tool is used by PuTTY to perform SSH authentication — not to perform data copies between computers.
· Psftp.exe
· Mstsc.exe
Explanation: PSCP, which stands for "PuTTY Secure Copy," is the name of the component of PuTTY that handles file transfers and is responsible for the application of the Secure Copy (SCP) protocol. It is a command-line program that is included with the PuTTY package and is used for the purpose of transferring data between computers across a network in a safe manner.
2. What is a protocol implemented by other programs for secure computer-to-computer access?
Answers
· Remote connection
· SSH
· SCP
· PuTTY
Explanation: For safe access from one computer to another, there are a few different protocols that may be implemented by other applications. SSH (also known as Secure Shell) is a well-known example of a program that offers secured communication over a network. It offers a variety of authentication mechanisms to provide a secure connection and enables for the provision of secure access to a distant computer system. One such protocol is known as SFTP, which stands for the Secure File transmission Protocol. This protocol, which is an extension of SSH, allows for the safe transmission of data between computers.
Within the field of computer networking, these protocols see widespread use for the purposes of remote administration, secure file transfers, and other secure communication requirements.
3. Which of these gives users a graphical user interface (GUI) to remote computers that have enabled connections from it.
Answers
· Pscp.exe
· PuTTY
· RDP
· SCP
Explanation: SSH (Secure Shell) with X11 forwarding is a standard technology used for connecting to distant computers while providing a graphical user interface (GUI). Through the use of X11 forwarding, it is possible to display locally the graphical desktop environment of a distant computer. You are able to execute graphical apps on the distant computer when you connect to it using SSH with X11 forwarding. These applications' graphical user interfaces will be presented on your local system.
Before you can make an SSH connection using PuTTY, you will need to make sure that the "Enable X11 forwarding" option in the PuTTY setup is checked. This is necessary in order to allow X11 forwarding. This gives you the ability to interact with the graphical apps that are running on the distant system as if they were running on your local workstation.
4. Which of the following is a Linux command used to copy files securely between computers on a network?
Answers
· SSH
· RDP
· PuTTY
· SCP
Explanation: scp, which stands for "Secure Copy," is the Linux command that is often used to safely transfer data from one computer on a network to another. It ensures that files are sent safely by using the Secure Shell (SSH) protocol.
5. What can you use to give access to files to a group of users as an alternative to transferring files from one computer to another?
Answers
· A shared folder
· Mstsc.exe
· A remote connection
· SSH
Explanation: Utilizing networked file systems and methods for file sharing is a viable alternative to the traditional method of moving data from one computer to another. Depending on the operating systems that are being used, a share may either be created using a Network File System (NFS) or a Server Message Block (SMB), which is a frequent way.
6. If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?
Answers
· Application and Services
· Security
· System
Explanation: It is quite probable that you will want to begin your inquiry by looking into the "Security" logs that are located in the Event Viewer of a Windows PC. The Security logs in the Event Viewer capture events that pertain to user authentication, logins, and other operations associated with the maintenance of system security.
7. In what log files can you find information about bootup errors? Select all that apply.
Answers
· /var/log/auth.log
· /var/log/mail.log
· /var/log/kern.log
· /var/log/syslog
8. In what log files can you find information about authentication errors?
Answers
· /var/log/auth.log
· /var/log/kern.log
· /var/log/syslog
· /var/log/mail.log
9. For an ssh connection to work, which of the following need to be true? Check all that apply.
Answers
· SSH is installed on client.
· The SSH server is running on the host you want to connect to.
· VPN needs to be set up.
· You need to specify a hostname to SSH into.
10. What command do you use to view error logs in real time?
Answers
· Less var/log/syslog
· /var/log/auth.log
· -kill
· Tail -f
Explanation: On a computer operating system that is similar to Unix, such as Linux, you may use the tail command in conjunction with the -f (follow) option to see error logs in real time. Because it enables you to keep track, in real time, of the lines that are being added to a file using the append command, the tail -f tool is particularly handy for monitoring logs.
11. Which of the following can be used to connect securely to a remote computer? (Choose all that apply)
Answers
· An SSH client
· A VPN connection
· An SSD client
· A dynamic-link library
12. What happens when you type the following command in the Powershell command line: putty.exe -ssh alex-chi@104.131.122.215 22?
Answers
· You will establish a chat connection with someone called “auser”
· You will establish a chat connection with someone called “auser”
· Your computer connects to an SSH located at IP address 104.131.122.215
· You will search for a user called “alex-chi” logged into your local area network
Answers
· share file
· net share
· file share
· share to net
14. What is Virtual Box?
Answers
· A cloud-based file hosting service
· A virtual machine
· Software for managing virtual instances
· A VPN network
15. Is it possible to run a virtual instance with Linux on a physical machine that is running Windows?
Answers
· Maybe
· No
· Yes
Once the virtual machine has been installed and is operational, it will be possible for you to run both Windows and Linux concurrently on the same physical system. This is very helpful for development, testing, learning, and any other situation in which you need to run numerous operating systems on a same machine. You may even use this to run different versions of the same operating system.
Answers
· LogOS View
· Event Viewer
· Powershell
· SLogGUI
Answers
· The /var/log/kern.log file
· The /var/log/uber.log file
· The /var/log/dmesg file
· The /var/log/syslog file
However, it is essential to keep in mind that the particular layout of log files might change depending on the Linux version you use. Some distributions make use of additional log files in addition to the /var/log/messages file for accomplishing the same goals.
Answers
· tail -f /var/log/syslog
· run -l /var/log/syslog
· view -rt /var/log/syslog
· rtview /var/log/syslog
Since the location of syslog files might differ depending on the distribution, feel free to alter the path to the syslog file as necessary. Alternately, the journalctl command could be used for accessing logs on certain systems, particularly if systemd is being used on such systems.
Answers
· To image a computer system
· To copy files from remote computers using the Secure Copy protocol (SCP)
· To set up a remote desktop
· To back up a machine
Answers
· SCP is less resource intensive than an email
· SCP encrypts a flash drive for transfer
· SCP uses SSH to transfer data
· There is no difference
Answers
· PuTTY
· LinuxSSH
· GoSSH
· OpenSSH
Answers
· It creates a virtual machine on your Windows desktop.
· It creates a virtual private network.
· It launches the Remote Desktop Protocol (RDP) client in Windows.
· It lets you copy files to and from remote computers.
Answers
· Virtual machines don’t require passwords
· Multiple users can use one virtual machine
· Virtual machines are free to use on the cloud
· It’s very simple to change virtual hardware resource allocation
Answers
· Download the Ubuntu OS image
· Restart the virtual instance
· Download a Windows OS image
· Add more physical RAM
Answers
· The top
· The middle
· The bottom
Answers
· PuTTYPwrShell
· PuTTYcmd
· Plink
· Premote
27. What is a virtual instance?
Answers
· A program for creating virtual machines
· A virtual machine that has been copied
· A virtual machine that only runs in the CLI
· A single virtual machine
28. In Linux, what type of messages are stored in the /var/log/dmesg file?
Answers
· Diagnostic messages
· System messages
· System startup messages
· Direct messages
Answers
· A cloned drive is more secure
· Cloned drives will last longer
· Installing from installation media is more resource intensive
· The cloned drive also includes settings and folders
Answers
· Source hostname
· Destination IP address
· Destination user
· Source IP address
Answers
· Secure Shell
· Single Server Hold
· Secure Service Handler
· Solid State Handshake
Answers
· A physical host machine
· Software for installing an OS image
· An image of Ubuntu
· A Windows host system
Answers
· Event Viewer
· SLogGUI
· LogOS View
· Powershell
34. It is important that log are regularly cleaned out to make room for new ones. In Linux, what utility manages this?
Answers
· logswap
· cleanlog
· logrotate
· delnewlog
35. What happens when you type the following command in the Linux command line: sudo dd if=/dev/sdd of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.
Answers
· You will create an image file on your desktop
· You will create a file called “100M.”
· You will make a copy of all data located on an sdd device.
· You will delete a file called “USBcopy.imge.”
36. What is the Microsoft Terminal Services Client used for?
Answers
· Enabling terminal connections on a remote computer.
· Locating terminals running on a computer.
· Creating RDP connections to remote computers.
· Connecting with Linux computers outside of the local network.
Explanation: The Microsoft Terminal Services Client is a software program that was created by Microsoft. It is also widely referred to as the Remote Desktop Connection (RDC) or the Remote Desktop Client (RDC). It allows users to view and interact with a remote desktop or server across a network. This may be done by connecting to the desktop or server remotely.
37. What is one reason you might avoid sharing a folder with everyone on your network in Windows?
Answers
· It means your computer always needs to be on.
· It’s resource intensive.
· It removes anything you’ve already placed in the folder.
· It’s not very secure.
Explanation: Sharing a folder with everyone on your network in Windows is a possible security risk, and doing so gives you no control over who on your network may view the things you share. For this reason, you should probably avoid doing so. When you share a folder with "Everyone," it indicates that every user on the network, including anonymous users and guest users, has the possibility of seeing the material that has been shared.
38. In the Windows Event viewer, what is the highest logging level for an event?
Answers
· Top
· Critical
· Warning
· High
Explanation: The "Critical" logging level for an event is the highest one that can be achieved in the Windows Event Viewer. The significance or gravity of an event may be determined based on its logging level, which is sometimes referred to as its event level or severity level. The levels are organized in a hierarchy, with the least severe being at the bottom and the most severe being at the top.
39. What event grouping can be used in the Windows Event Viewer to filter specific types of events?
Answers
· Filter Views
· Custom Views
· Error View
· Sorted Logs
Explanation: You may organize and filter various sorts of events in the Windows Event Viewer by using the "Event Logs" or "Custom Views" options. These options are based on criteria that you establish. The use of "Event Channels," on the other hand, is a popular method that may organize and filter events.
Event Channels are a method for classifying occurrences in accordance with the context in which they occurred. Events are often categorized into distinct channels, which makes it much simpler to find and evaluate events that are connected to one another. The use of Event Channels enables a more organized and structured view of the event data, which assists in grouping events coming from a variety of sources and applications.
40. You’re working on a computer, but the log doesn’t show any clear errors. Where in the log would be a good place to start searching for the problem?
Answers
· The bottom
· The top
· The middle
Explanation: If the log doesn't display any obvious faults while you're working on a computer, the "System" log in the Windows Event Viewer is an excellent location to begin looking for the cause of the issue. It's usual practice to look for information concerning system-level problems in the "System" log, which logs a range of events generated by Windows system components, services, and drivers. This log is called the "System" log.