Integrating your Infrastructure Security Week 1 Flashcards

(10 cards)

1
Q

Which folder contains all directories for all users except the root user?

A

/home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Jacob found a text file that contains content. He wants to overwrite the data in the file and replace it with something else. Which of the following commands can do that?

A

echo “Hello!” > file.txt

The > operator is used for redirection and it overwrites the file so the command echo “Hello!” > file.txt will overwrite the existing content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following commands is used for file manipulation in Linux?

A

cp
mv

The commands cp and mv are used for file manipulation, specifically for copying and moving files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You found a sensitive file that seems to contain passwords. When you try to read the file, you notice that there is too much data to read. How can you search for passwords in the file?

A

Filter with “grep.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following commands displays the contents of a file?

A

cat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following commands lists all the files in a directory?

A

ls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linux is an open-source operating system

A

True

Linux is an open-source operating system, meaning its source code is freely available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which user has the highest permissions in the system?

A

root

In a Unix or Linux-based system, the “root” user has the highest level of permissions and can perform any administrative task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which command creates an empty file if it does not exist?

A

touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which operator can be used to run a binary in the background?

A

&

How well did you know this?
1
Not at all
2
3
4
5
Perfectly