Which of the following command and flag combinations should the administrator use?

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?A . tr -d B. uniq -c C. wc -m D. grep -cView AnswerAnswer: C Explanation: Reference: https://cmdlinetips.com/2011/08/how-to-count-the-number-of-lines-words-and-characters-in-a-text- file-from-terminal/

December 3, 2022 No Comments READ MORE +

Which location would be the BEST place for the security professional to find technical information about this malware?

A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an infection. Which location would be the BEST place for the security professional to find technical information about this malware?A . Threat intelligence feeds B. Computer emergency response team (CERT) press releases C. Vulnerability databases...

December 3, 2022 No Comments READ MORE +

Which of the following tools will be MOST effective during the investigation?

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective...

December 3, 2022 No Comments READ MORE +

Which of the following tools would the consultant use?

After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application. Which of the following tools would the consultant use?A . Nikto B. Kismet C. tcpdump D. HydraView AnswerAnswer: A Explanation: Reference: https://www.scnsoft.com/blog/network-vulnerability-assessment-guide

December 1, 2022 No Comments READ MORE +

Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux...

December 1, 2022 No Comments READ MORE +