Week 9 Q’s Flashcards

1
Q

Which of the following is not a benefit of using Linux for SOC analysis?

A) Customizable
B) Open source
C) Expensive
D) Highly secure

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Linux command is used to list all the files in a directory?

A) pwd
B) ls
C) cd
D) cp

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Linux tool can be used to monitor network traffic in real-time?

A) tcpdump
B) ping
C) nslookup
D) traceroute

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a Linux firewall?

A) To block access to specific websites
B) To scan for viruses
C) To enhance network security
D) To optimize system performance

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Linux tool can be used to analyze system logs?

A) ls
B) grep
C) awk
D) tail

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a Linux intrusion detection system (IDS)?

A) To prevent unauthorized access to a system
B) To detect potential security threats
C) To block incoming traffic
D) To optimize system performance

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Linux tool is commonly used for automation and scripting?

A) sed
B) awk
C) bash
D) grep

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Linux forensics?

A) The process of investigating security incidents and breaches
B) The process of hardening a Linux system
C) The process of monitoring network traffic
D) The process of automating SOC tasks and processes

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Linux-based system is used to enhance security by enforcing mandatory access controls?

A) SELinux
B) Apache
C) BIND
D) SSH

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Linux tool can be used for vulnerability scanning and management?

A) Wireshark
B) Nessus
C) Snort
D) Metasploit

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Linux command is used to display the IP addresses of network interfaces on a system?

A) ipconfig
B) ifconfig
C) netstat
D) ping

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between a Linux server and a Linux workstation?

A) A server is more expensive than a workstation
B) A server is designed for network services, while a workstation is designed for individual use
C) A server has fewer security features than a workstation
D) A server is less powerful than a workstation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Linux tool can be used to remotely access and control another system?

A) telnet
B) ftp
C) ssh
D) http

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Linux hardening?

A) The process of optimizing system performance
B) The process of increasing the security of a Linux system
C) The process of automating SOC tasks and processes
D) The process of monitoring network traffic

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Linux-based system is used to monitor for potential security threats in real time?

A) Snort
B) Nessus
C) Metasploit
D) Wireshark

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Linux threat hunting?

A) The process of investigating potential security threats
B) The process of automating SOC tasks and processes
C) The process of monitoring network traffic
D) The process of hardening a Linux system

A

A

17
Q

Which Linux tool is commonly used for data recovery in forensic investigations?

A) dd
B) ls
C) grep
D) awk

A

A

18
Q

Which Linux-based system is used to manage and track vulnerabilities across multiple systems?

A) Nagios
B) OSSEC
C) OpenVAS
D) Snort

A

C

19
Q

Which Linux command is used to search for a specific text string in a file?

A) ls
B) grep
C) awk
D) sed

A

B

20
Q

Which Linux tool can be used to create and manage virtual machines?

A) VirtualBox
B) VMware
C) KVM
D) Docker

A

C