Linux Commands Flashcards

1
Q

Lists files and directories in a directory. Understanding file permissions and ownership is crucial for securing Linux systems.

A

Is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Changes the permissions (read, write, execute) of files and directories. Proper permission settings are essential for securing sensitive files and restricting unauthorized access.

A

chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Changes the ownership of files and directories. Assigning appropriate ownership helps ensure that only authorized users have control over specific files and directories.

A

chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lists currently running processes. It allows you to monitor active processes on a Linux system and identify any suspicious or unauthorized activities.

A

ps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Displays real-time system resource usage, including CPU, memory, and process information. It helps monitor system performance and identify any unusual resource consumption that may indicate malicious activity.

A

top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Displays network connections, open ports, and related information. It allows you to identify active network connections, listening ports, and potential security risks.

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configures and manages firewall rules on a Linux system. It provides packet filtering and network address translation (NAT) capabilities to control network traffic and secure the system.

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Captures and analyzes network traffic. It is a powerful command-line packet sniffer that helps monitor and troubleshoot network issues, as well as detect suspicious network activities.

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Searches for files and directories within a specified location. It is useful for locating specific files, verifying file integrity, or identifying potentially malicious files.

A

find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Searches for specific text patterns within files or output. It allows you to search for keywords or patterns in log files, configuration files, or command output to identify potential security issues.

A

grep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly