Microsoft (MS-500) Exam Questions And Answers page 23
What type of equipment would a forensics investigator store in a StrongHold bag?
Backup tapes
Hard drives
Wireless cards
Manage governance and compliance features in Microsoft 365
Monitor and troubleshoot Microsoft 365 security
What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?
A compressed file
A Data stream file
An encrypted file
A reserved file
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?
SD memory
CF memory
MMC memory
SM memory
Implement and manage identity and access
Implement and manage information protection
What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?
AA55
00AA
AA00
A100
Monitor and troubleshoot Microsoft 365 security
What will the following command accomplish?
dd if=/dev/xxx of=mbr.backup bs=512 count=1
dd if=/dev/xxx of=mbr.backup bs=512 count=1
Back up the master boot record
Restore the master boot record
Mount the master boot record on the first partition of the hard drive
Restore the first 512 bytes of the first partition of the hard drive
Monitor and troubleshoot Microsoft 365 security
What will the following command accomplish in Linux?
fdisk /dev/hda
fdisk /dev/hda
Partition the hard drive
Format the hard drive
Delete all files under the /dev/hda folder
Fill the disk with zeros
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'
Deletes the entire members table
Inserts the Error! Reference source not found.email address into the members table
Retrieves the password for the first user in the members table
This command will not produce anything since the syntax is incorrect
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
What will the following Linux command accomplish?
dd if=/dev/mem of=/home/sam/mem.bin bs=1024
dd if=/dev/mem of=/home/sam/mem.bin bs=1024
Copy the master boot record to a file
Copy the contents of the system folder to a file
Copy the running memory to a file
Copy the memory dump file to an image file
Implement and manage identity and access
Implement and manage information protection
What will the following URL produce in an unpatched IIS Web Server?
http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\
http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\
Directory listing of C: drive on the web server
Insert a Trojan horse into the C: drive of the web server
Execute a buffer flow in the C: drive of the web server
Directory listing of the C:\windows\system32 folder on the web server
Implement and manage information protection
Manage governance and compliance features in Microsoft 365
When analyzing logs, it is important that the clocks of all the network devices are synchronized. Which protocol will help in synchronizing these clocks?
UTC
PTP
Time Protocol
NTP
Manage governance and compliance features in Microsoft 365
Monitor and troubleshoot Microsoft 365 security
Comments