CompTIA A+ (220-1002) Performanced-Based Questions #3
Anastasia-Instructor September 4, 2022
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
You are working on a Linux workstation. A file named dojo needs to be renamed to dojolab. Type the command to rename the file.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 2 of 15
2. Question
Type the command to copy the /etc/passwd file to /mnt/backup directory for some backup purpose.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 3 of 15
3. Question
You are working on a Linux workstation. There is a file in your current directory named “dojolab.txt”, type the command to delete it.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 4 of 15
4. Question
Your co-worker recently left the company, and you need to change ownership of his files on the Linux server to a new user. Type the command to do this.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 5 of 15
5. Question
Type the command to change a file’s permissions in Linux.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 6 of 15
6. Question
You are working on a Linux workstation. Type the command to configure the wireless network interface.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 7 of 15
7. Question
You are troubleshooting network connectivity issues from a Linux workstation. Type the command to check the computer’s IP address and subnet mask.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 8 of 15
8. Question
Type the right command and switch to have a glance at all the running processes on your Linux workstation.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 9 of 15
9. Question
Type the command to start a new shell on a Linux workstation, with root permissions.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 10 of 15
10. Question
You are logged into a Linux workstation with a regular user account. Type the command to execute a command with root permissions.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 11 of 15
11. Question
You want to install patches to upgrade the operating system of your workstation which runs Fedora Linux. Type the command to do this.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 12 of 15
12. Question
You want to change some lines of code in the file named dojolab.py. The file contains scripts written in Python. Type the command to open the file and make the changes with the vi editor.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 13 of 15
13. Question
The Linux workstation you are using seems slow. You want to see what processes are running on the computer. Type the command to do this.
-
student@dojolab:~$
CorrectIncorrect -
-
Question 14 of 15
14. Question
Sort the steps for malware removal according to CompTIA’s best practice procedure.
-
Identify and research malware symptoms
-
Educate the end user
-
Enable System Restore and create a restore point
-
Remediate the infected systems
-
Schedule scans and run updates
-
Quarantine the infected systems
-
Disable System Restore
View Answers:
CorrectIncorrect -
-
Question 15 of 15
15. Question
Drag the social engineering attacks to the description of their use.
Sort elements
- Phishing
- Spear phishing
- Shoulder surfing
- Tailgating
-
An attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message
-
An email or electronic communications scam targeted towards a specific individual, organization or business
-
Thieves steal your personal data by spying over your shoulder as you use a laptop, ATM
-
Attackers seeking entry to a restricted area without proper authentication
CorrectIncorrect