1. Which portion of the PuTTY package allows you to perform file transfers using the Secure Copy protocol?
Answers
·
Pscp.exe
·
Pageant.exe – Not quite. The pageant
tool is used by PuTTY to perform SSH authentication — not to perform data
copies between computers.
·
Psftp.exe
·
Mstsc.exe
Explanation: PSCP, which stands for "PuTTY Secure Copy," is the name of the component of PuTTY that handles file transfers and is responsible for the application of the Secure Copy (SCP) protocol. It is a command-line program that is included with the PuTTY package and is used for the purpose of transferring data between computers across a network in a safe manner.
2. What is a protocol
implemented by other programs for secure computer-to-computer access?
Answers
·
Remote connection
·
SSH
·
SCP
·
PuTTY
Explanation: For safe access from one computer to another, there are a
few different protocols that may be implemented by other applications. SSH
(also known as Secure Shell) is a well-known example of a program that offers
secured communication over a network. It offers a variety of authentication
mechanisms to provide a secure connection and enables for the provision of
secure access to a distant computer system. One such protocol is known as SFTP,
which stands for the Secure File transmission Protocol. This protocol, which is
an extension of SSH, allows for the safe transmission of data between
computers.
Within the field of computer networking, these protocols see widespread use for the purposes of remote administration, secure file transfers, and other secure communication requirements.
3. Which of these gives
users a graphical user interface (GUI) to remote computers that have enabled
connections from it.
Answers
·
Pscp.exe
·
PuTTY
·
RDP
·
SCP
Explanation: SSH (Secure Shell) with X11 forwarding is a standard
technology used for connecting to distant computers while providing a graphical
user interface (GUI). Through the use of X11 forwarding, it is possible to
display locally the graphical desktop environment of a distant computer. You
are able to execute graphical apps on the distant computer when you connect to
it using SSH with X11 forwarding. These applications' graphical user interfaces
will be presented on your local system.
Before you can make an SSH connection using PuTTY, you will need to make sure that the "Enable X11 forwarding" option in the PuTTY setup is checked. This is necessary in order to allow X11 forwarding. This gives you the ability to interact with the graphical apps that are running on the distant system as if they were running on your local workstation.
4. Which of the
following is a Linux command used to copy files securely between computers on a
network?
Answers
·
SSH
·
RDP
·
PuTTY
·
SCP
Explanation: scp, which stands for "Secure Copy," is the Linux command that is often used to safely transfer data from one computer on a network to another. It ensures that files are sent safely by using the Secure Shell (SSH) protocol.
5. What can you use to
give access to files to a group of users as an alternative to transferring
files from one computer to another?
Answers
·
A shared folder
·
Mstsc.exe
·
A remote connection
·
SSH
Explanation: Utilizing networked file systems and methods for file sharing is a viable alternative to the traditional method of moving data from one computer to another. Depending on the operating systems that are being used, a share may either be created using a Network File System (NFS) or a Server Message Block (SMB), which is a frequent way.
6. If you were
investigating login issues on a Windows computer, which portion of the Event
Viewer logs would be a good place to start your investigation?
Answers
·
Application and Services
·
Security
·
System
Explanation: It
is quite probable that you will want to begin your inquiry by looking into the
"Security" logs that are located in the Event Viewer of a Windows PC.
The Security logs in the Event Viewer capture events that pertain to user
authentication, logins, and other operations associated with the maintenance of
system security.
7. In what log files can
you find information about bootup errors? Select all that apply.
Answers
·
/var/log/auth.log
·
/var/log/mail.log
·
/var/log/kern.log
·
/var/log/syslog
8. In what log files can
you find information about authentication errors?
Answers
·
/var/log/auth.log
·
/var/log/kern.log
·
/var/log/syslog
·
/var/log/mail.log
9. For an ssh connection
to work, which of the following need to be true? Check all that apply.
Answers
·
SSH is installed on
client.
·
The SSH server is running
on the host you want to connect to.
·
VPN needs to be set up.
·
You need to specify a
hostname to SSH into.
10. What command do you
use to view error logs in real time?
Answers
·
Less var/log/syslog
·
/var/log/auth.log
·
-kill
·
Tail -f
Explanation: On
a computer operating system that is similar to Unix, such as Linux, you may use
the tail command in conjunction with the -f (follow) option to see error logs
in real time. Because it enables you to keep track, in real time, of the lines
that are being added to a file using the append command, the tail -f tool is
particularly handy for monitoring logs.
11. Which of the following can be
used to connect securely to a remote computer? (Choose all that apply)
Answers
·
An SSH client
·
A VPN connection
·
An
SSD client
·
A
dynamic-link library
12.
What happens when you type the following command in the Powershell command
line: putty.exe -ssh alex-chi@104.131.122.215 22?
Answers
·
You
will establish a chat connection with someone called “auser”
·
You
will establish a chat connection with someone called “auser”
·
Your
computer connects to an SSH located at IP address 104.131.122.215
·
You
will search for a user called “alex-chi” logged into your local area network
Answers
·
share
file
·
net share
·
file
share
·
share
to net
14. What is Virtual Box?
Answers
·
A
cloud-based file hosting service
·
A
virtual machine
·
Software for managing virtual instances
·
A
VPN network
15. Is it possible to run a virtual
instance with Linux on a physical machine that is running Windows?
Answers
·
Maybe
·
No
·
Yes
Once the
virtual machine has been installed and is operational, it will be possible for
you to run both Windows and Linux concurrently on the same physical system.
This is very helpful for development, testing, learning, and any other
situation in which you need to run numerous operating systems on a same
machine. You may even use this to run different versions of the same operating
system.
Answers
·
LogOS
View
·
Event Viewer
·
Powershell
·
SLogGUI
Answers
·
The
/var/log/kern.log file
·
The
/var/log/uber.log file
·
The
/var/log/dmesg file
·
The /var/log/syslog file
However,
it is essential to keep in mind that the particular layout of log files might
change depending on the Linux version you use. Some distributions make use of
additional log files in addition to the /var/log/messages file for
accomplishing the same goals.
Answers
·
tail
-f /var/log/syslog
·
run
-l /var/log/syslog
·
view
-rt /var/log/syslog
·
rtview
/var/log/syslog
Since the
location of syslog files might differ depending on the distribution, feel free
to alter the path to the syslog file as necessary. Alternately, the journalctl
command could be used for accessing logs on certain systems, particularly if
systemd is being used on such systems.
Answers
· To
image a computer system
·
To
copy files from remote computers using the Secure Copy protocol (SCP)
·
To
set up a remote desktop
·
To
back up a machine
Answers
·
SCP
is less resource intensive than an email
·
SCP
encrypts a flash drive for transfer
·
SCP uses SSH to transfer data
·
There
is no difference
Answers
·
PuTTY
·
LinuxSSH
·
GoSSH
·
OpenSSH
Answers
·
It
creates a virtual machine on your Windows desktop.
·
It
creates a virtual private network.
·
It
launches the Remote Desktop Protocol (RDP) client in Windows.
·
It
lets you copy files to and from remote computers.
Answers
·
Virtual
machines don’t require passwords
·
Multiple
users can use one virtual machine
·
Virtual
machines are free to use on the cloud
·
It’s very simple to change virtual hardware resource allocation
Answers
·
Download the Ubuntu OS image
·
Restart
the virtual instance
·
Download
a Windows OS image
·
Add
more physical RAM
Answers
·
The top
·
The
middle
·
The
bottom
Answers
·
PuTTYPwrShell
·
PuTTYcmd
·
Plink
·
Premote
27. What is a virtual instance?
Answers
·
A
program for creating virtual machines
·
A
virtual machine that has been copied
·
A
virtual machine that only runs in the CLI
·
A single virtual machine
28. In Linux, what type of messages
are stored in the /var/log/dmesg file?
Answers
·
Diagnostic
messages
·
System
messages
·
System startup messages
·
Direct
messages
Answers
·
A
cloned drive is more secure
·
Cloned
drives will last longer
·
Installing
from installation media is more resource intensive
·
The cloned drive also includes settings and
folders
Answers
·
Source
hostname
·
Destination IP address
·
Destination user
·
Source
IP address
Answers
·
Secure Shell
·
Single
Server Hold
·
Secure
Service Handler
·
Solid
State Handshake
Answers
·
A physical host machine
·
Software for installing an OS image
·
An image of Ubuntu
·
A
Windows host system
Answers
·
Event Viewer
·
SLogGUI
·
LogOS
View
·
Powershell
34. It is important that log are
regularly cleaned out to make room for new ones. In Linux, what utility manages
this?
Answers
·
logswap
·
cleanlog
·
logrotate
·
delnewlog
35. What happens when
you type the following command in the Linux command line: sudo dd if=/dev/sdd
of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.
Answers
·
You will create an image
file on your desktop
·
You will create a file called “100M.”
·
You will make a copy of
all data located on an sdd device.
·
You will delete a file called
“USBcopy.imge.”
36. What is the
Microsoft Terminal Services Client used for?
Answers
·
Enabling terminal connections on a
remote computer.
·
Locating terminals running on a
computer.
·
Creating RDP connections
to remote computers.
·
Connecting with Linux computers
outside of the local network.
Explanation: The
Microsoft Terminal Services Client is a software program that was created by
Microsoft. It is also widely referred to as the Remote Desktop Connection (RDC)
or the Remote Desktop Client (RDC). It allows users to view and interact with a
remote desktop or server across a network. This may be done by connecting to
the desktop or server remotely.
37. What is one reason
you might avoid sharing a folder with everyone on your network in Windows?
Answers
·
It means your computer always needs to
be on.
·
It’s resource intensive.
·
It removes anything you’ve already
placed in the folder.
·
It’s not very secure.
Explanation: Sharing
a folder with everyone on your network in Windows is a possible security risk,
and doing so gives you no control over who on your network may view the things
you share. For this reason, you should probably avoid doing so. When you share
a folder with "Everyone," it indicates that every user on the
network, including anonymous users and guest users, has the possibility of
seeing the material that has been shared.
38. In the Windows Event
viewer, what is the highest logging level for an event?
Answers
·
Top
·
Critical
·
Warning
·
High
Explanation: The "Critical" logging level for an event is the highest one that can be achieved in the Windows Event Viewer. The significance or gravity of an event may be determined based on its logging level, which is sometimes referred to as its event level or severity level. The levels are organized in a hierarchy, with the least severe being at the bottom and the most severe being at the top.
39. What event grouping
can be used in the Windows Event Viewer to filter specific types of events?
Answers
·
Filter Views
·
Custom Views
·
Error View
·
Sorted Logs
Explanation: You may organize and filter various sorts of events in the
Windows Event Viewer by using the "Event Logs" or "Custom
Views" options. These options are based on criteria that you establish.
The use of "Event Channels," on the other hand, is a popular method
that may organize and filter events.
Event Channels are a method for classifying occurrences in accordance with the context in which they occurred. Events are often categorized into distinct channels, which makes it much simpler to find and evaluate events that are connected to one another. The use of Event Channels enables a more organized and structured view of the event data, which assists in grouping events coming from a variety of sources and applications.
40. You’re working on a
computer, but the log doesn’t show any clear errors. Where in the log would be
a good place to start searching for the problem?
Answers
·
The bottom
·
The top
·
The middle
Explanation: If the log doesn't display any obvious faults while you're working on a computer, the "System" log in the Windows Event Viewer is an excellent location to begin looking for the cause of the issue. It's usual practice to look for information concerning system-level problems in the "System" log, which logs a range of events generated by Windows system components, services, and drivers. This log is called the "System" log.