5. Which command from the following is used to check the script execution policy in the windows powershell? a. Set-ExecutionPolicy remotesigned O b. Get-ExecutionPolicy Remotesigned O c. Set-ExecutionPolicy O d. Get-ExecutionPolicy
Q: Which command is used to gain real-time information about processes running on thesystem, with the…
A: “top” command: The command "top" shows an interactive screen listing processes organized by…
Q: Which INT 21h functions shown in this chapter probably will not work under Windows NT,2000, or XP…
A: INT 21h functions INT 21h function reads a character from the standard input device and echoes it…
Q: You are the network administrator for Slimjim, a peripheral device company. Thenetwork uses Linux,…
A: Two commands are available to search manual pages. The manual pages in Linux are also known as man…
Q: with a compromised Linux operating system. Which of t
A: Given: An attacker detects that commands such as "cdilsrm" do not work when they provide an SSH…
Q: Which keystrokes do you use to move top command to the background? | Run ps command. List all the…
A: The keystroke use to move top command to the background is bg
Q: What is the command that used to restrict the number of the mac address in the port O switchport…
A: The switchport protection feature allows you to configure a switchport such that traffic is…
Q: Which of the following commands can be used to find the hostname of your computer on Windows?…
A: Host Name will appear at the top, under the section Windows IP Configuration.…
Q: You are conducting a security investigation of malicious activity that took place on the target…
A: Answer: Correct Option is Make a screen capture showing the commands used to copy and decrypt the…
Q: #!/ bin / bash while true do echo a > / dev / null done Give the script executable rights…
A: Before moving to the answering the question, there is a small change in the commands given. The…
Q: Write code that when executed in PowerShell, will satisfy the following requirements: • List all of…
A: PowerShell commands List all of the processes on a remote computer. use invoke command with script…
Q: IV. Write a command to add user account with these properties a. Name fedora b. ID-???, it's the…
A: The above question is solved in step 2:-
Q: QUESTION 8 Which of the following cmdlets will you use to create local users using Windows…
A: Given: Which of the following cmdlets will you use to create local users using Windows…
Q: Scenario Your manager, a senior Windows Administrator, has asked you to collect information from…
A: So as mentioned in question we have to create and test the following given commands in windows…
Q: Which one of the following is a symlink to the root path as seen by the process? i. /proc/[PID]/root…
A: Question. Which one of the following is a symlink to the root path as seen by the process? i.…
Q: "chmod" is a well known command line utility, that is used for manually managing the access and…
A: After execution of the given command: The command “chmod” is used for changing the access…
Q: Write a script to create a group called ”Eng1” and create 10 users with user name…
A: #!/bin/bash groupadd Eng1 # Create a group called ”Eng1” for i in {1..10} # Create 10 users with…
Q: This is output of powershell cmdlet: PS /home/_ Get-History Id Duration CommandLine 1 0.002…
A: We use the history query frequently in our day-to-day work to verify the history of a command or to…
Q: Which process will always have a PID of 1 and a PPID of 0?a. the kernel itselfb. psc. initd. top
A: Process having PID of 1 and PPID of 0 Init daemon is the first process that is started by the Linux…
Q: ng the script from running? a. The computer was running on Windows XP. b. The script was…
A: Sara, a network administrator, downloads a Windows PowerShell script that can be used to delete user…
Q: Which of the following actions should you first take to secure your Linux computeragainst network…
A: First Action to Secure Linux Computer: To overcome the network attack, only the necessary network…
Q: 1- Which of the following constructor create a server socket with the specified port, listen…
A: Answer :- 1. This class executes server sockets. A server attachment trusts that solicitations…
Q: When you run the ps command, how are daemon processes recognized?a. The terminal is listed as…
A: A daemon process is a system process that is started during system startup. The daemon process is…
Q: What will be stored into cx after executing the following commands? x1 DW 13 DUP(?),5,4,8 mov cx,…
A: In Registers -> There are processor register which are divided into general register, control…
Q: 3. In the below PowerShell AD script why is ">>" used instead of “>"? Get-ADForest >»…
A: The answer is
Q: You have provisioned a Linux server on Amazon's EC2 cloud. To allow login from your Putty client on…
A: Amazon Elastic Compute Cloud (EC2) offers the broadest and deepest compute platform, with over 400…
Q: Which command enables a title for the x- axis? Select one: a. horilabel() b. xlabel() C. xlabel[] d.…
A: xlabel( txt ) labels the x-axis of the current axes or standalone visualization. Reissuing the…
Q: Which listed below choice controls the flow of the script to catch errors? O Raise О Ту-еxcept O…
A: Answer in step2
Q: Imagine that you have configured the enable secret command, followed by the enable password command,…
A: We use the enable password command to set a local password to control access to various privilege…
Q: Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his…
A: Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his…
Q: In Linux, consider the following command line: strace -p 756 -o firefox_trace.txt
A: In Unix-like operating systems like Linux, strace is a robust command line utility for…
Q: Write Shell script that take domain name as input from user and check that website is up or down…
A: Basically you have to use below script to achieve the required its using ping command with a timeout…
Q: With which command can I get awk to output the home directories of the top 20 users, their login…
A: overview: A command is a precise instruction from a user to the operating system or an application…
Q: Which of the following commands can be used to start a UNIX SysV daemon called lalain runlevels 1,…
A: “chkconfig” command can be used to start a particular daemon in the required run levels. “chkconfig…
Q: out the Operating system version?
A: given - Which of the folling commands can be used to obtain information about the Operating system…
Q: Which command would a user type on the command line to find out which directory inthe directory tree…
A: Directory: Many types of files are available in Linux and these get organized with the use of a…
Q: Which of the following will occur when a system call is invoked? -the PSW is saved - an ISR is…
A: Step 1:- Introduction:- The operating system plays an important role in the computer system without…
Q: Which of the following Linux commands can you use to make the following script executable? Assume…
A: The chmod Command in Linux stands for Change Mode in LINUX, which is a function to change / modify /…
Q: hat boot option loads Windows with a minimum configuration and can create a stable environment when…
A: Secure Mode detection of your device is a helpful way to identify popular problems with your PC,…
Q: Which of the following definitions best describe a snap-in? a. It is a Windows PowerShell…
A: - We need to highlight the correct option among the provided ones for snap in. - Snap-in is the…
Q: Which of these commands is available only in Linux? a. ping b. ipconfig c. dig d. nslookup
A: Explanation: “ping” is used in both Windows and Linux. “ipconfig” is used in Windows command…
Q: Which command can be used to see processes running in the background?a. bgb. jobsc. ps -%d. fg
A: Command for seeing processes in the background The jobs command is used to display the status of…
Q: Mary is a system administrator in your organization. She has recently made changes tothe DHCP…
A: DHCP configuration Dynamic Host Control Protocol (DHCP) is a network protocol. A Dynamic Host…
Q: Which file does the UNIX SysV init daemon reference on startup to determine thedefault runlevel?a.…
A: File determining default run level /etc/inittab is a configuration file that contains descriptions…
Q: As daemon processes are not associated with terminals, you must use the –e switchwith the ps command…
A: Daemon processes Daemon processes runs as background processes. It is not under the direct control…
Q: Which of the following is a good practice ? A. Give full permission for remote transferring B.…
A: Given: Which of the following is a good practice ? A. Give full permission for remote transferringB.…
Q: Which of the following commands can be used to scan the available ports on computerswithin your…
A: To find the correct command that can be used to scan the available ports on computers within an…
Step by step
Solved in 2 steps
- QUESTION 31 Which of the following cmdlets can you use to check if the Windows event log is running? a. Get-Service b. Get-Member c. Get-NetIPConfiguration d. Get-HelpWhich command could you use to see a list of all environment and user-defined shellvariables as well as their current values?a. ls /varb. envc. setd. echo3. In Linux, write a command Find every line that contains two or more “<<” symbols in the folder named “Folder2”.
- Which of the following policy settings are not supported by Local Group Policy on Windows 10? Software installation Start Menu and Taskbar Folder redirection Software Restriction PolicyWe have a series of folders in the current folder which are named with permission codes (example: 522, 700, 777). I'm looking for a command that allows you to take the permission code from the folder name, and apply it to the folder and all the files it contains. Using "xargs"Regarding Exchange Server 2019 Let’s take a look at a couple of the commands. Type Test-ServiceHealth and press <Enter> What does this command do? When would you use it? Why is it helpful? Type Test-MapiConnectivity and press <Enter> What does this show? Type Test-MapiConnectivity DHall and press <Enter> What does this show? What is the difference between the commands in step 7 and 8? Type Get-MailboxStatistics DHall | Format-List DisplayName, IsQuarantined What does this command tell us? When would you run this command? What is a concern about restoring data to its original location? What are the options for users to restore their own deleted messages? Why would you want to allow them to do this?
- Which of the following is not found on the status pop-up?a. Accessibilityb. Network connectionc. Shelfd. Settings buttone. Lock buttonWhich command blanks the terminal screen, erasing previously displayed output?a. eraseb. cleanc. blankd. clearWhich of the following statement is true ? Choose an answer A The –x option displays the lines of code in the script but does not execute the command line B The –v option displays the lines of code in the script but does not execute the command line C The –x option displays the lines of code in the script at the time of execution D The –v option displays the lines of code in the script at the time of execution
- Write a program that will use the ls -la command to show the contents of your home directory. Usethe above example in 6– you do not need to add the backslash-escaped characters.8.1. Comment all lines as to what they do.Please help with the following: in linux Give a description of what each command does and explore 1 option Command Description Explored options echo help man mkdir clear