Week 9 Q’s Flashcards
Which of the following is not a benefit of using Linux for SOC analysis?
A) Customizable
B) Open source
C) Expensive
D) Highly secure
C
Which Linux command is used to list all the files in a directory?
A) pwd
B) ls
C) cd
D) cp
B
Which Linux tool can be used to monitor network traffic in real-time?
A) tcpdump
B) ping
C) nslookup
D) traceroute
A
What is the purpose of a Linux firewall?
A) To block access to specific websites
B) To scan for viruses
C) To enhance network security
D) To optimize system performance
C
Which Linux tool can be used to analyze system logs?
A) ls
B) grep
C) awk
D) tail
D
What is the purpose of a Linux intrusion detection system (IDS)?
A) To prevent unauthorized access to a system
B) To detect potential security threats
C) To block incoming traffic
D) To optimize system performance
B
Which Linux tool is commonly used for automation and scripting?
A) sed
B) awk
C) bash
D) grep
C
What is Linux forensics?
A) The process of investigating security incidents and breaches
B) The process of hardening a Linux system
C) The process of monitoring network traffic
D) The process of automating SOC tasks and processes
A
Which Linux-based system is used to enhance security by enforcing mandatory access controls?
A) SELinux
B) Apache
C) BIND
D) SSH
A
Which Linux tool can be used for vulnerability scanning and management?
A) Wireshark
B) Nessus
C) Snort
D) Metasploit
B
Which Linux command is used to display the IP addresses of network interfaces on a system?
A) ipconfig
B) ifconfig
C) netstat
D) ping
B
What is the difference between a Linux server and a Linux workstation?
A) A server is more expensive than a workstation
B) A server is designed for network services, while a workstation is designed for individual use
C) A server has fewer security features than a workstation
D) A server is less powerful than a workstation
B
Which Linux tool can be used to remotely access and control another system?
A) telnet
B) ftp
C) ssh
D) http
C
What is Linux hardening?
A) The process of optimizing system performance
B) The process of increasing the security of a Linux system
C) The process of automating SOC tasks and processes
D) The process of monitoring network traffic
B
Which Linux-based system is used to monitor for potential security threats in real time?
A) Snort
B) Nessus
C) Metasploit
D) Wireshark
A
What is Linux threat hunting?
A) The process of investigating potential security threats
B) The process of automating SOC tasks and processes
C) The process of monitoring network traffic
D) The process of hardening a Linux system
A
Which Linux tool is commonly used for data recovery in forensic investigations?
A) dd
B) ls
C) grep
D) awk
A
Which Linux-based system is used to manage and track vulnerabilities across multiple systems?
A) Nagios
B) OSSEC
C) OpenVAS
D) Snort
C
Which Linux command is used to search for a specific text string in a file?
A) ls
B) grep
C) awk
D) sed
B
Which Linux tool can be used to create and manage virtual machines?
A) VirtualBox
B) VMware
C) KVM
D) Docker
C