Which protocol is primarily used by SSH for secure remote access?

  • SSH
  • FTP
  • HTTP
  • Telnet
SSH (Secure Shell) primarily uses the SSH protocol for secure remote access. SSH is a cryptographic network protocol that ensures secure communication over unsecured networks. It provides authentication and encrypted data transfer.

The _________ directory in Linux is typically used for transient or temporary data, often cleared during boot.

  • /home
  • /opt
  • /tmp
  • /var
The /tmp directory in Linux is typically used for transient or temporary data. It is often cleared during system boot to ensure it doesn't accumulate unnecessary files and take up space.

You are trying to optimize a Linux server that handles large amounts of data transfer. Which command would you use to monitor disk activity in real-time?

  • iotop
  • vmstat
  • df
  • ifconfig
To monitor disk activity in real-time on a Linux server, you can use the iotop command. It displays a list of processes and their disk I/O usage, helping you identify which processes are the most disk-intensive.

To temporarily save iptables rules, one would use the command iptables-save > ________.

  • rules.txt
  • config.rules
  • iptables.conf
  • saved-rules
To temporarily save iptables rules, one would use the command iptables-save > **rules.txt**. This command saves the current firewall rules to a file called "rules.txt" for later use or backup.

Which Linux distribution focuses primarily on security and is often used for penetration testing?

  • CentOS
  • Fedora
  • Kali Linux
  • Ubuntu
Kali Linux is a Linux distribution that focuses primarily on security and is widely used for penetration testing and ethical hacking. It comes pre-installed with a variety of security tools and is maintained by Offensive Security.

AppArmor policies are commonly defined using which type of files?

  • Profiles
  • Blueprints
  • Rules
  • Directories
AppArmor policies are commonly defined using profiles. These profiles specify the access controls for individual applications or processes, allowing you to confine their behavior and enhance system security.

The _________ command is used to display the disk usage of files and directories.

  • df
  • du
  • space
  • usage
The "du" (disk usage) command is used to display the disk usage of files and directories in Linux. It provides information about the space consumed by each file or directory, helping you manage disk space effectively.

Which command-line tool is used to view real-time system processes in Linux?

  • top
  • ls
  • cat
  • ps
The correct answer is "top." The top command is a real-time system monitoring tool in Linux that provides information about system processes, CPU usage, memory usage, and more. It allows users to monitor and manage running processes interactively.

You've been given a task to find all occurrences of the word "error" in a directory containing numerous log files. Which command would you primarily use for this search?

  • grep
  • find
  • sed
  • awk
To find all occurrences of the word "error" in a directory with log files, you would primarily use the grep command. grep is a powerful tool for searching text and regular expressions in files and can be used to quickly locate specific content, like error messages, within files.

Which command is used to send ICMP echo requests to test network connectivity?

  • ping
  • ifconfig
  • traceroute
  • netstat
The correct command to send ICMP echo requests to test network connectivity is 'ping.' When you run 'ping' followed by an IP address or hostname, it sends ICMP echo requests to that address and waits for responses, allowing you to determine if the network connection is working.