Question: The default shell prompt for the root user in the bash shell is

Answer Options:

/
~
$

Answer: #

 

Question: An example of an absolute path is

Answer Options:

temp.txt
/temp.txt
./temp.txt
../temp.txt

Answer: /temp.txt

 

Question: An example of a relative path is

Answer Options:

/usr/temp.txt
temp.txt
./temp.txt
/home/gpe/temp.txt

Answer: temp.txt

 

Question: To navigate to a specific folder, we can use the command

Answer Options:

grep
pwd
ls
cd

Answer: cd

 

Question: To view the contents of a folder, we can use the command

Answer Options:

cd
ls
pwd
head

Answer: ls

 

Question: When using a shell program, command arguments are

Answer Options:

Debates among system administrators on which commands to use
Single letters or full words that modify the behavior of the command in a pre-determined way
Debates between users on which command to use
Data provided to a command to use as input

Answer: Data provided to a command to use as input

 

Question: When using a shell program, command options (also called flags or switches) are

Answer Options:

Data provided to a command to use as input
Debates between users on which command to use
Debates among system administrators on which commands to use
Single letters or full words that modify the behavior of the command in a pre-determined way

Answer: Single letters or full words that modify the behavior of the command in a pre-determined way

 

Question: To view the contents of a file, we can use the command

Answer Options:

cat
more
less
all of the above

Answer: all of the above

 

Question: The command used to copy files in Unix/Linux is

Answer Options:

mv
copy
cp
pwd

Answer: cp

 

Question: The command used to delete files and folders in Unix/Linux is

Answer Options:

rm
del
cd
grep

Answer: rm

 

Question: Information security is becoming increasingly important because of

Answer Options:

There is a general increase in criminal behavior in society
The increasing criticality of information to individuals and organizations
People are greedier these days
Organizations are wealthier these days

Answer: The increasing criticality of information to individuals and organizations

 

Question: Many users are vulnerable to

Answer Options:

Stolen usernames and passwords from a compromised site being used to compromise their bank accounts
Hackers compromising the IT systems at large financial institutions
Attacks on ATM machines
Demands for usernames and passwords at gunpoint

Answer: Stolen usernames and passwords from a compromised site being used to compromise their bank accounts

 

Question: The biggest time-consuming activity for most information security professionals is

Answer Options:

Fixing software bugs
Responding to information security incidents
Researching new technologies
Helping customers

Answer: Responding to information security incidents

 

Question: Desired competencies for information security professionals include all of the following except

Answer Options:

Risk management
Forensics
Secure SDLC
Marketing

Answer: Marketing

 

Question: A desired competency for information security professionals is

Answer Options:

Accounting
Marketing
End user awareness
Financial planning

Answer: End user awareness

 

Question: As the use of personal devices for work has increased, the work of information security professionals has

Answer Options:

Increased
Decreased
None of the above
Stayed the same

Answer: Increased

 

Question: Information security professionals report spending a lot of time on

Answer Options:

Political issues
Fixing software bugs
Developing internal security policies, standards and procedures
Researching new technologies

Answer: Developing internal security policies, standards and procedures

 

Question: The Internet is relevant for information security because

Answer Options:

It led to exploits from weakness in wireless networks
It exposed computers to attacks from around the world
It caused one of the most significant Internet outages ever
It caused falsification of financial records at publicly traded companies

Answer: It exposed computers to attacks from around the world