5. Which command from the following is used to check the script execution policy in the windows powershell? a. Set-ExecutionPolicy remotesigned O b. Get-ExecutionPolicy Remotesigned O c. Set-ExecutionPolicy O d. Get-ExecutionPolicy
Q: Which command is used to gain real-time information about processes running on thesystem, with the…
A: “top” command: The command "top" shows an interactive screen listing processes organized by…
Q: Which INT 21h functions shown in this chapter probably will not work under Windows NT,2000, or XP…
A: INT 21h functions INT 21h function reads a character from the standard input device and echoes it…
Q: You are the network administrator for Slimjim, a peripheral device company. Thenetwork uses Linux,…
A: Two commands are available to search manual pages. The manual pages in Linux are also known as man…
Q: with a compromised Linux operating system. Which of t
A: Given: An attacker detects that commands such as "cdilsrm" do not work when they provide an SSH…
Q: Which keystrokes do you use to move top command to the background? | Run ps command. List all the…
A: The keystroke use to move top command to the background is bg
Q: What is the command that used to restrict the number of the mac address in the port O switchport…
A: The switchport protection feature allows you to configure a switchport such that traffic is…
Q: Which of the following commands can be used to find the hostname of your computer on Windows?…
A: Host Name will appear at the top, under the section Windows IP Configuration.…
Q: You are conducting a security investigation of malicious activity that took place on the target…
A: Answer: Correct Option is Make a screen capture showing the commands used to copy and decrypt the…
Q: #!/ bin / bash while true do echo a > / dev / null done Give the script executable rights…
A: Before moving to the answering the question, there is a small change in the commands given. The…
Q: Write code that when executed in PowerShell, will satisfy the following requirements: • List all of…
A: PowerShell commands List all of the processes on a remote computer. use invoke command with script…
Q: IV. Write a command to add user account with these properties a. Name fedora b. ID-???, it's the…
A: The above question is solved in step 2:-
Q: QUESTION 8 Which of the following cmdlets will you use to create local users using Windows…
A: Given: Which of the following cmdlets will you use to create local users using Windows…
Q: Scenario Your manager, a senior Windows Administrator, has asked you to collect information from…
A: So as mentioned in question we have to create and test the following given commands in windows…
Q: Which one of the following is a symlink to the root path as seen by the process? i. /proc/[PID]/root…
A: Question. Which one of the following is a symlink to the root path as seen by the process? i.…
Q: "chmod" is a well known command line utility, that is used for manually managing the access and…
A: After execution of the given command: The command “chmod” is used for changing the access…
Q: Write a script to create a group called ”Eng1” and create 10 users with user name…
A: #!/bin/bash groupadd Eng1 # Create a group called ”Eng1” for i in {1..10} # Create 10 users with…
Q: This is output of powershell cmdlet: PS /home/_ Get-History Id Duration CommandLine 1 0.002…
A: We use the history query frequently in our day-to-day work to verify the history of a command or to…
Q: Which process will always have a PID of 1 and a PPID of 0?a. the kernel itselfb. psc. initd. top
A: Process having PID of 1 and PPID of 0 Init daemon is the first process that is started by the Linux…
Q: ng the script from running? a. The computer was running on Windows XP. b. The script was…
A: Sara, a network administrator, downloads a Windows PowerShell script that can be used to delete user…
Q: Which of the following actions should you first take to secure your Linux computeragainst network…
A: First Action to Secure Linux Computer: To overcome the network attack, only the necessary network…
Q: 1- Which of the following constructor create a server socket with the specified port, listen…
A: Answer :- 1. This class executes server sockets. A server attachment trusts that solicitations…
Q: When you run the ps command, how are daemon processes recognized?a. The terminal is listed as…
A: A daemon process is a system process that is started during system startup. The daemon process is…
Q: What will be stored into cx after executing the following commands? x1 DW 13 DUP(?),5,4,8 mov cx,…
A: In Registers -> There are processor register which are divided into general register, control…
Q: 3. In the below PowerShell AD script why is ">>" used instead of “>"? Get-ADForest >»…
A: The answer is
Q: You have provisioned a Linux server on Amazon's EC2 cloud. To allow login from your Putty client on…
A: Amazon Elastic Compute Cloud (EC2) offers the broadest and deepest compute platform, with over 400…
Q: Which command enables a title for the x- axis? Select one: a. horilabel() b. xlabel() C. xlabel[] d.…
A: xlabel( txt ) labels the x-axis of the current axes or standalone visualization. Reissuing the…
Q: Which listed below choice controls the flow of the script to catch errors? O Raise О Ту-еxcept O…
A: Answer in step2
Q: Imagine that you have configured the enable secret command, followed by the enable password command,…
A: We use the enable password command to set a local password to control access to various privilege…
Q: Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his…
A: Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his…
Q: In Linux, consider the following command line: strace -p 756 -o firefox_trace.txt
A: In Unix-like operating systems like Linux, strace is a robust command line utility for…
Q: Write Shell script that take domain name as input from user and check that website is up or down…
A: Basically you have to use below script to achieve the required its using ping command with a timeout…
Q: With which command can I get awk to output the home directories of the top 20 users, their login…
A: overview: A command is a precise instruction from a user to the operating system or an application…
Q: Which of the following commands can be used to start a UNIX SysV daemon called lalain runlevels 1,…
A: “chkconfig” command can be used to start a particular daemon in the required run levels. “chkconfig…
Q: out the Operating system version?
A: given - Which of the folling commands can be used to obtain information about the Operating system…
Q: Which command would a user type on the command line to find out which directory inthe directory tree…
A: Directory: Many types of files are available in Linux and these get organized with the use of a…
Q: Which of the following will occur when a system call is invoked? -the PSW is saved - an ISR is…
A: Step 1:- Introduction:- The operating system plays an important role in the computer system without…
Q: Which of the following Linux commands can you use to make the following script executable? Assume…
A: The chmod Command in Linux stands for Change Mode in LINUX, which is a function to change / modify /…
Q: hat boot option loads Windows with a minimum configuration and can create a stable environment when…
A: Secure Mode detection of your device is a helpful way to identify popular problems with your PC,…
Q: Which of the following definitions best describe a snap-in? a. It is a Windows PowerShell…
A: - We need to highlight the correct option among the provided ones for snap in. - Snap-in is the…
Q: Which of these commands is available only in Linux? a. ping b. ipconfig c. dig d. nslookup
A: Explanation: “ping” is used in both Windows and Linux. “ipconfig” is used in Windows command…
Q: Which command can be used to see processes running in the background?a. bgb. jobsc. ps -%d. fg
A: Command for seeing processes in the background The jobs command is used to display the status of…
Q: Mary is a system administrator in your organization. She has recently made changes tothe DHCP…
A: DHCP configuration Dynamic Host Control Protocol (DHCP) is a network protocol. A Dynamic Host…
Q: Which file does the UNIX SysV init daemon reference on startup to determine thedefault runlevel?a.…
A: File determining default run level /etc/inittab is a configuration file that contains descriptions…
Q: As daemon processes are not associated with terminals, you must use the –e switchwith the ps command…
A: Daemon processes Daemon processes runs as background processes. It is not under the direct control…
Q: Which of the following is a good practice ? A. Give full permission for remote transferring B.…
A: Given: Which of the following is a good practice ? A. Give full permission for remote transferringB.…
Q: Which of the following commands can be used to scan the available ports on computerswithin your…
A: To find the correct command that can be used to scan the available ports on computers within an…
Step by step
Solved in 2 steps
- If the playTime variable in a JavaScript program has been initialized, the id of a timed command has been stored in it, and that timed command has been initiated, which method can be called to stop this timed command? a. window.clearInterval(playTime) b. window.setInterval(playTime, false) c. window.stopInterval(playTime) d. playtime.clearInterval()q17: What is the significance of a faded (dimmed) command in a drop- down menu? * There are no equivalent keystrokes for the particular command. -The command is not currently accessible. A dialog box appears if the command is selected. A Help window appears if the command is selected. q18 :How do you open a program when there isn't an icon on the desktop for the one you want to use? Right click to reveal all icons. Click the START button and select the program from the menu. Restart the computer. It is not possible to open the O program if no icons are on the desktop.Please give me the answers for these question below: To upgrade Windows PowerShell to a newer version, we need to download and install this! To update the Windows PowerShell Help System, we should use this SwitchParameter with the Update-Help cmdlet because PowerShell only updates the help files once every 24 hours. If we want to find all cmdlets in the ActiveDirectory module, we should use this parameter with the Get-Command cmdlet to filter our query. Name two aliases for the Get-ChildItem cmdlet.
- When Windows starts up, just where are the settings that are referred to as the "Last Known Good" come up? If the configuration has already been established, is there a method to preserve it so that it may be used later?Log in to the GNOME desktop on your Fedora 20 system as user1 and open a commandlineterminal. At a shell prompt, type xeyes to execute the xeyes program. Does theterminal window stay open? Click the terminal window to bring it to the foreground. Doyou see your shell prompt? Why? Close your terminal window by clicking the X symbol inthe upper-right corner. What happened to the xeyes program? Why?Next, open another command-line terminal and type xeyes& at the command promptto execute the xeyes program in the background. Click the terminal window to bring it to theforeground. Do you see your shell prompt? Why? Close your terminal window by clicking theX symbol in the upper-right corner. What happened to the xeyes program? Why?Finally, open another command-line terminal and type nohup xeyes& at thecommand prompt to execute the xeyes program in the background from the nohupcommand. Click the terminal window to bring it to the foreground and press Enter. Doyou see your shell prompt?…In linux Use a pipe to view all of your current environment variables with less, and what command did use for this?
- where do you find the folder that contains that folder that was identified from the Infection Monkey web interface as the location where the malicious file was remotely copied to the vWorkstation.?You have recently modified the options within the /etc/default/grub file. What commandcan you use next to rebuild the GRUB2 configuration file?a. grub2-installb. grub-installc. grubbyd. grub2-mkconfigWe have a series of folders in the current folder which are named with permission codes (example: 522, 700, 777). I'm looking for a command that allows you to take the permission code from the folder name, and apply it to the folder and all the files it contains. Using "xargs"
- Which INT 21h functions shown in this chapter probably will not work under Windows NT,2000, or XP with a restricted user profile?Write a script to create a group called ”Eng1” and create 10 users with user name ”student1”-”student10” in ”Eng1” group. For each user, create a script that prints out ”Hello ${username}, welcome to "Eng1” and put the script in user’s home directory. Show command that were used with screenshots Linux, centOS7, VirtualBoxWhich command indicates the shared libraries required by a certain executableprogram?a. ldconfigb. lddc. rpm –Vd. slconfig