What command do you use to perform this action?
After installing a new application on your SuSe Linux server, you need to read through the log
files.
When you open the files, you notice they are very long, and you only wish to check the newest
entries to the file. What command do you use to perform this action?
Which of the following Snort rules will log any tcp traffic from any IP address to any port between 1 and 1024
You are configuring your new IDS machine, where you have recently installed Snort. While you
are working with this machine, you wish to create some basic rules to test the ability to log traffic
as you desire.
Which of the following Snort rules will log any tcp traffic from any IP address to any port between 1
and 1024 on any host in the 10.0.10.0/24 network?
which would need to be catered for in the Service Management plan?
Which type of event or activity can trigger a service Change, which would need to be catered for in
the Service Management plan?
What command will allow you to achieve this?
You have a file on your Linux system, and you need to modify the file’s permissions. The
permissions you wish to apply are: Read, Write, and Execute for the User; Read and Write for the
Group: and Read for the Others. What command will allow you to achieve this?
The best course of action for you to take would be:
You have discovered that your Bastion host has been compromised but cannot determine when
the compromise occurred. The best course of action for you to take would be:
Why is it important that reviews are conducted at regular intervals during the Check phase of the Plan-Do-Chec
Why is it important that reviews are conducted at regular intervals during the Check phase of the
Plan-Do-Check-Act (PDCA) methodology?
what values are assigned to the user account?
When a new user account is created in Linux, what values are assigned to the user account?
What is the effect of this rule?
You are configuring your new IDS machine, and are creating new rules. You enter the following
rule:
Alert tcp any any -> any 23 (msg: “Telnet Connection Attempt”;)
What is the effect of this rule?
What is the certification audit primarily based on?
What is the certification audit primarily based on?
What command will allow you to achieve this?
You have a file on your Linux system, and you need to modify the file’s permissions. The
permissions you wish to apply are: Read, Write, and Execute for the User; Read for the Group:
and Read for the Others.
What command will allow you to achieve this?