100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
OSP201 SU24 Questions and Answers 2024 $11.49   Add to cart

Exam (elaborations)

OSP201 SU24 Questions and Answers 2024

 3 views  0 purchase
  • Course
  • Institution

OSP201 SU24 Questions and Answers 2024 221. Which tool is generally not used to decrypt and test passwords? a. RainbowCrack b. Nessus® c. Hydra d. John the Ripper ** Answ** b 222. You want to list open files, focusing the output on network-related processes and organizing the...

[Show more]

Preview 4 out of 34  pages

  • August 9, 2024
  • 34
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
OSP201 SU24 Questions and Answers 2024

221. Which tool is generally not used to decrypt and test passwords?

a. RainbowCrack
b. Nessus®
c. Hydra
d. John the Ripper ** Answ** b

222. You want to list open files, focusing the output on network-related processes and
organizing the connections by service. Which command can you use?

a. lsof -ni
b. netstat -atun
c. netstat -r
d. netstat -t ** Answ** a

223. Which command uses the ping command to display a list of active systems on a
network?

a. nmap -sP 10.0.0.0/8
b. nmap 192.168.0.1-3
c. nmap 192.168.0.0/24
d. nmap -sO 192.168.0.3 ** Answ** a

224. Of the following virtualization solutions, which one runs Linux systems only as
guests?

a. Kernel-based Virtual Machine (KVM)
b. Microsoft Virtual Server
c. VMware
d. Virtualbox, open source edition ** Answ** b

225. Which of the following is a valid reason to use a Live CD on a suspected
compromised system?

a. The live CD can restore the system back to its original state before the compromise.
b. The Live CD can trick the black-hat hacker into exploiting the Live CD instead of the
production system.
c. The Live CD can be used for forensic analysis.
d. This Live CD can temporarily replace the compromised system while a restore is
being performed ** Answ** c

226. Which of the following commands is used to transfer data over an SSH connection
in encrypted format?

,a. dd -encrypt
b. rsync -e ssh
c. cp -e ssh
d. dump /dev/sda ** Answ** b

227. Which of the following do you need to work with an encrypted filesystem during a
digital forensic investigation?

a. lvm2
b. cryptsetup
c. Both A and B
d. Neither A nor B ** Answ** c

228. Which instrument documents where evidence came from, how that evidence was
duplicated, and the methods used to analyze that evidence?

a. Evidence log
b. Evidence access documentation
c. Chain of access
d. Chain of custody ** Answ** d

229. Which command creates a bit-by-bit duplicate of an original disk?

a. dd
b. rr
c. mount
d. async ** Answ** a

230. What is a drawback of the rsync command for backing up files?

a. It does not include free space in a disk or partition in the backup.
b. Efficiency.
c. It transmits data in clear text.
d. None of the above. ** Answ** c

231. What is one of the first steps in incident response?

a. Identify compromised systems.
b. Confirm the breach.
c. Have gold replace system in place.
d. Report to senior management ** Answ** b

232. Which command does not include free space in the duplication process?

a. dd

,b. dd_rescue
c. icat
d. rsync ** Answ** d

233. You want to see which users are currently logged into a system including
information on the process currently being executed by the logged-in user. Which
command can you use?

a. w
b. who
c. utmpdump /var/log/wtmp
d. users ** Answ** a

234. You want to find executable files in user directories. Which command is the best
choice?

a. find
b. where
c. ls
d. strace ** Answ** a

235. You are performing computer forensics and need to review data currently in RAM.
What do you do to ensure you don't lose or modify the RAM data?

a. Shut down the computer and then restart it when connected to a network segment.
b. Use a forensics kit such as Helix Knoppix.
c. Use the xcopy command.
d. Use the dd command. ** Answ** b

236. You are performing computer forensics. You just transferred data from the victim's
hard disk to a forensic system. What is the next step you should perform?

a. Wipe the victim's hard disk.
b. Reboot the forensic system.
c. Create a checksum file.
d. None of the above ** Answ** c

237. What is the best description of a functional bug?

a. A flaw in software that prevents part of a program from running properly
b. A security threat
c. A bug that promotes the functioning of a program
d. None of the above ** Answ** a

238. Which command upgrades rather than installs a Linux distribution?

, a. apt-get install
b. apt-get dist-upgrade
c. apt-get update
d. apt-get dist-fresh ** Answ** b

239. Which software, when available, should allow you to configure Linux as a domain
controller on a Microsoft Active Directory network?

a. Enhanced Squid
b. Apache 4.0
c. Samba 4.0
d. NFS 4.0 ** Answ** c

240. What is Content Scramble System (CSS) associated with?

a. Web page design
b. Web page security
c. Content filtering
d. Digital rights management ** Answ** d

241. Where is the best place to report bugs you encounter in open source software?

a. Bug reporting site
b. The developers themselves
c. The store where you purchased the software media
d. User forums ** Answ** a

242. What is the name of the emerging firewall that is expected to replace iptables?

a. nttables
b. nftables
c. Linux Firewall
d. Hot Armor ** Answ** b

201. Which of the following is not an Ubuntu repository?

a. OpenSource
b. Restricted
c. Universe
d. Multiverse ** Answ** a

202. What is Anaconda?

a. A Linux desktop
b. A Linux installation program
c. A Web browser

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller smartchoices. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart