Chapter 1 Extras (SY0-601) PTQ Learn Mode
0 of 3 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 3 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Remember, all the questions have explanations explaining why the correct answers are correct and why the incorrect answers are incorrect. Click “View Questions” to see the explanations.
- Review / Skip
- Question 1 of 3
Lisa is manually searching through a large log file on a Linux system looking for indications of a brute force attack. Which of the following commands will automate this process for her?CorrectIncorrect
- Question 2 of 3
A server in your network’s DMZ was recently attacked. The firewall logs show that the server was attacked from an external IP address with the following socket: 22.214.171.124:5678. You need to check the server to see if it still has an active connection. Which of the following tools should you use?CorrectIncorrect
- Question 3 of 3
You want to verify that the syslog file is being rotated successfully on a Linux system. Which of the following commands is the BEST choice to use?CorrectIncorrect