Lab 10
Lab 10
5. What is the importance of defining roles and responsibilities in an Incident Response Plan?
A) To ensure accountability and streamline the response process
B) To confuse the team
C) To increase bureaucracy
D) To delay the response
9. Which Linux command is used to check the network configuration and status?
A) ifconfig
B) netstat
C) nslookup
D) route
11. What was the root cause of the ASF incident on April 9, 2010?
A) Natural disaster
B) Unauthorized access to their infrastructure
C) Hardware failure
D) Software bug
14. What was one key response action taken by ASF after detecting the incident?
A) Changing all passwords and SSH keys
B) Ignoring the incident
C) Upgrading hardware
D) Shutting down the internet
18. How does a Live CD help in maintaining the integrity of the compromised system?
A) By ensuring no changes are made to the system during analysis
B) By modifying system files
C) By encrypting all data
D) By deleting logs
21. What is the first step when responding to a suspected system compromise?
A) Disconnect the system from the network
B) Reboot the system
C) Inform the media
D) Delete suspicious files
35. Which command checks the integrity of a file using SHA-256 hash?
A) sha256sum
B) md5sum
C) cat
D) grep
41. Which command is used to create an IPFire virtual machine using VirtualBox?
A) vboxmanage createvm --name IPFire
B) virtualbox createvm IPFire
C) vboxcreate --vm IPFire
D) createvm --name IPFire
44. Which command is used to clone a GitHub repository for installing Nikto?
A) git clone https://github.com/sullo/nikto
B) git fetch https://github.com/sullo/nikto
C) git pull https://github.com/sullo/nikto
D) git copy https://github.com/sullo/nikto
49. How do you check the status of a Docker container running Snort?
A) docker ps
B) docker status
C) docker check snort
D) docker run snort --status