Question: The default shell prompt for the root user in the bash shell is
Answer Options:
Answer: #
Question: An example of an absolute path is
Answer Options:
Answer: /temp.txt
Question: An example of a relative path is
Answer Options:
Answer: temp.txt
Question: To navigate to a specific folder, we can use the command
Answer Options:
Answer: cd
Question: To view the contents of a folder, we can use the command
Answer Options:
Answer: ls
Question: When using a shell program, command arguments are
Answer Options:
Answer: Data provided to a command to use as input
Question: When using a shell program, command options (also called flags or switches) are
Answer Options:
Answer: Single letters or full words that modify the behavior of the command in a pre-determined way
Question: To view the contents of a file, we can use the command
Answer Options:
Answer: all of the above
Question: The command used to copy files in Unix/Linux is
Answer Options:
Answer: cp
Question: The command used to delete files and folders in Unix/Linux is
Answer Options:
Answer: rm
Question: Information security is becoming increasingly important because of
Answer Options:
Answer: The increasing criticality of information to individuals and organizations
Question: Many users are vulnerable to
Answer Options:
Answer: Stolen usernames and passwords from a compromised site being used to compromise their bank accounts
Question: The biggest time-consuming activity for most information security professionals is
Answer Options:
Answer: Responding to information security incidents
Question: Desired competencies for information security professionals include all of the following except
Answer Options:
Answer: Marketing
Question: A desired competency for information security professionals is
Answer Options:
Answer: End user awareness
Question: As the use of personal devices for work has increased, the work of information security professionals has
Answer Options:
Answer: Increased
Question: Information security professionals report spending a lot of time on
Answer Options:
Answer: Developing internal security policies, standards and procedures
Question: The Internet is relevant for information security because
Answer Options:
Answer: It exposed computers to attacks from around the world