Week 9 Q’s Flashcards
Which of the following is not a benefit of using Linux for SOC analysis?
A) Customizable
B) Open source
C) Expensive
D) Highly secure
C
Which Linux command is used to list all the files in a directory?
A) pwd
B) ls
C) cd
D) cp
B
Which Linux tool can be used to monitor network traffic in real-time?
A) tcpdump
B) ping
C) nslookup
D) traceroute
A
What is the purpose of a Linux firewall?
A) To block access to specific websites
B) To scan for viruses
C) To enhance network security
D) To optimize system performance
C
Which Linux tool can be used to analyze system logs?
A) ls
B) grep
C) awk
D) tail
D
What is the purpose of a Linux intrusion detection system (IDS)?
A) To prevent unauthorized access to a system
B) To detect potential security threats
C) To block incoming traffic
D) To optimize system performance
B
Which Linux tool is commonly used for automation and scripting?
A) sed
B) awk
C) bash
D) grep
C
What is Linux forensics?
A) The process of investigating security incidents and breaches
B) The process of hardening a Linux system
C) The process of monitoring network traffic
D) The process of automating SOC tasks and processes
A
Which Linux-based system is used to enhance security by enforcing mandatory access controls?
A) SELinux
B) Apache
C) BIND
D) SSH
A
Which Linux tool can be used for vulnerability scanning and management?
A) Wireshark
B) Nessus
C) Snort
D) Metasploit
B
Which Linux command is used to display the IP addresses of network interfaces on a system?
A) ipconfig
B) ifconfig
C) netstat
D) ping
B
What is the difference between a Linux server and a Linux workstation?
A) A server is more expensive than a workstation
B) A server is designed for network services, while a workstation is designed for individual use
C) A server has fewer security features than a workstation
D) A server is less powerful than a workstation
B
Which Linux tool can be used to remotely access and control another system?
A) telnet
B) ftp
C) ssh
D) http
C
What is Linux hardening?
A) The process of optimizing system performance
B) The process of increasing the security of a Linux system
C) The process of automating SOC tasks and processes
D) The process of monitoring network traffic
B
Which Linux-based system is used to monitor for potential security threats in real time?
A) Snort
B) Nessus
C) Metasploit
D) Wireshark
A