

![]()


Cybersecurity Fundamentals introduces students to the principles, technologies, and practices essential for protecting digital information and systems from cyber threats. The course covers key concepts such as network security, cryptography, risk management, threat analysis, and security policies. Students will explore common types of cyber attacks, learn how to identify vulnerabilities, and understand methods for securing computers, mobile devices, and data. Through real-world case studies and hands-on exercises, participants gain foundational skills necessary to assess risks and implement effective security measures in both personal and professional environments.
Recommended Textbook Linux+ Guide to Linux Certification 3rd Edition by Jason Eckert
Available Study Resources on Quizplus
14 Chapters
630 Verified Questions
630 Flashcards
Source URL: https://quizplus.com/study-set/1375 Page 2

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27413
Sample Questions
Q1) The source code for Linux was released in ____.
A) 1987
B) 1990
C) 1991
D) 1993
Answer: C
Q2) The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.
A) Open Source Software
B) Linux
C) Closed Source Software
D) Freeware
Answer: A
Q3) Companies that use services on a computer to serve client computers are said to have a(n) Internet server. _________________________
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27414
Sample Questions
Q1) In Linux, what does the term terminal refer to? Why is a terminal necessary?
Answer: A terminal is the channel that allows a certain user to log in to a Linux kernel, and there can be many terminals in Linux that allow you to log in to the computer locally or across a network. After a user logs in to a terminal, she receives a user interface called a shell, which then accepts input from the user and passes this input to the kernel for processing.
Q2) A swap partition contains a filesystem.
A)True
B)False
Answer: False
Q3) What is virtual memory?
Answer: Virtual memory consists of an area on the hard disk that, when the physical memory (RAM) is being used excessively, can be used to store information that would normally reside in the physical memory.When programs are executed that require a great deal of resources on the computer, information is continuously swapped from the physical memory to the virtual memory on the hard disk, and vice versa.
Q4) To print the current date and time, type the command ____________________.
Answer: date
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27415
Sample Questions
Q1) The ____ command will confirm the system directory that you are currently in.
A) dir
B) pwd
C) whereami
D) ld
Answer: B
Q2) The more command should not be used on binary files.
A)True
B)False
Answer: True
Q3) The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors.
A) XEmacs
B) vi
C) Emacs
D) gedit
Answer: D
Q4) When a user logs into their Linux system, he is placed in the ____________________ directory.
Answer: home
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27416
Sample Questions
Q1) The chgrp command takes ____ argument(s) at minimum.
A) one
B) two
C) three
D) four
Q2) You can use wildcard metacharacters with the find command.
A)True
B)False
Q3) Command used to quickly create an empty file.
A)chgrp
B)groups
C)alias
D)touch
E)chmod
F)chown
G)ping
H)whoami
I)umask
Q4) To create a(n) ____________________ link, you use the -s option to the ln command.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27417
Sample Questions
Q1) Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.
A) breaks
B) corruption
C) degradation
D) failures
Q2) What is filesystem corruption? What factors may lead to filesystem corruption?
Q3) What are the three different types of hard drives? Briefly describe each, and list the possible configurations and device files for each type.
Q4) PATA hard disk drives typically have faster data transfer speeds, and most systems allow for the connection of more than four such hard disks.
A)True
B)False
Q5) You can edit the quotas for certain users by using the ____ command.
A) edquota
B) editquota
C) quota
D) repquota
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27418
Sample Questions
Q1) When you use disk imaging software to write a Linux ISO image onto a USB flash drive, the filesystem existing on the flash drive is maintained.
A)True
B)False
Q2) The BIOS configurations on different computers are generally very similar or exactly the same.
A)True
B)False
Q3) What is a SCSI ID and why is it used? List the priorities, from highest to lowest, of the SCSI IDs on a SCSI controller that supports 15 devices.
Q4) Each SCSI device is assigned a unique ID number known as a(n) ____.
A) device ID
B) target ID
C) SCSI number
D) SCSI controller
Q5) What is System Rescue? Explain how you would activate this tool.
Q6) A(n) ____________________ CPU is a CPU that has a speed greater than the speed that was originally intended for the processor.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27419
Sample Questions
Q1) Constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.
A)hashpling
B)tee
C)environment variables
D)stdin
E)stderr
F)decision construct
G)shell scripts
H)stdout
I)file descriptors
Q2) Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.
A)True
B)False
Q3) The ____________________ command takes user input from stdin and places it in a variable specified by an argument.
Q4) Describe the while construct. How and why is it used?
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27420
Sample Questions
Q1) A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off.
A) 0
B) 1
C) 6
D) 7
Q2) The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2.
A) kwin
B) twm
C) metacity
D) sawfish
Q3) After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.
A) xvidtune
B) xvideotune
C) xtune
D) vidtune
Q4) What is the GRUB root partition? How does GRUB locate the GRUB root partition?
Q5) Why might dual-booting be necessary or desired?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27421
Sample Questions
Q1) Most commands such as ls, find, and grep are binary programs that exist on the filesystem until executed. _________________________
A)True
B)False
Q2) Daemon used to schedule a command to execute repeatedly in the future.
A)cron daemon
B)program
C)/var/spool/cron
D)trapping
E)PPID
F)PID
G)/etc/crontab
H)/var/spool/at
I)at daemon
Q3) If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
A)True
B)False
Q4) The ____________________ can be used to affect the process priority indirectly.
Page 11
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27422
Sample Questions
Q1) By default, all print jobs have a priority of ____.
A) -50
B) 0
C) 50
D) 100
Q2) Describe the process of sending information to a printer using the CUPS daemon.
Q3) Describe how the /etc/passwd and /etc/shadow files are used in the authentication process. Why are two files used instead of one? How can you convert a system to use the /etc/shadow file to store passwords?
Q4) _______________________________________________________ represents a text description of the user and is typically left blank.
Q5) The lp command uses the ____ option to specify the destination printer name.
A) -n
B) -p
C) -d
D) -l
Q6) CUPS contains versions of the lpr, lpc, lpq, and lprm commands.
A)True
B)False

12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27423
Sample Questions
Q1) When using the cpio utility, the ____ option causes a new archive to be created.
A) -n
B) -c
C) -o
D) -a
Q2) Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.
Q3) The ____ option can be used with the tar command to extract a specified archive.
A) -s
B) -e
C) -x
D) -a
Q4) To view the contents of a file that was compressed with the bzip2 utility, you must use the ____________________ command.
Q5) The tar utility cannot back up device files or files with filenames longer than 255 characters.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27424
Sample Questions
Q1) Two or more computers that are connected with media that can exchange information are called a(n) ____________________.
Q2) Computer names are called ____.
A) host IDs
B) network names
C) host names
D) network IDs
Q3) You can view or set the host name for a Linux computer using the ____________________ command.
Q4) The /etc/resolv.conf file can contain up to ____ DNS servers.
A) two
B) three
C) four
D) five
Q5) The subnet mask for a Class B IP address is ____.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Q6) What is VNC? How does it transfer graphics across the network?
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27425
Sample Questions
Q1) The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
A) /var/named/named.ca
B) /etc/named.conf
C) /var/named/named.local
D) /etc/named.loop
Q2) The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
A) upload filename
B) mput filename
C) put filename
D) get filename
Q3) What is Sendmail? How do you identify the users on a Sendmail system? What is the process of making changes to this identification?
Q4) What is NFS? How do you access files using a configured NFS Server?
Q5) You can use the ____________________ command to connect to both Samba and Windows servers.
Q6) How does DHCP automatically configure IP addresses?
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27426
Sample Questions
Q1) The measures taken when system problems arise.
A)proactive maintenance
B)ulimit
C)/etc/ld.so.conf
D)vmstat
E)/var/log
F)sudo
G)Orca
H)reactive maintenance
I)Pluggable Authentication Modules (PAM)
Q2) The ____________________ command is used to view the current SELinux status.
Q3) How can netfilter/iptables be used to create a firewall service?
Q4) Performance problems are caused by hardware, not software.
A)True
B)False
Q5) The free command can be used to display the total amounts of physical and swap memory in Kilobytes and their utilizations. _________________________
A)True
B)False
Q6) What methods can be used to physically secure local computers?
To view all questions and flashcards with answers, click on the resource link above. Page 16