Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may require some improvement. The answers to the questions can be found in the Assessments section at the end of this book:
- Which filesystem allows a threat actor to hide a file within another file so as to avoid detection?
A. EXT4
B. NTFS
C. EXT3
D. FAT32
- Which filesystem is currently being used on Linux systems?
A. HFS+
B. FAT32
C. EXT4
D. APFS
- Which command can be used to view a list of partitions on a Linux system?
A.
parted
B.
dparted
C.
view partition
D.
ls -l
- Which metric within CVSS defines how an attack can happen on a target system?
A. Attack complexity
B. Network
C. Attack vector
D. Adjacent
- Which of the following can be submitted to VirusTotal to perform malware analysis?
A. File
B. URL
C. Hash
D. All of the above