Search Header Logo

Question Chapter 12C (3of3)

Authored by Khairul Imtiyaz

Computers

University

Used 1+ times

Question Chapter 12C (3of3)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the type of library linking where an application's required libraries are identified at compile time and included with the executable binary, resulting in a stand-alone, self-contained executable file?

Statically Linked

Dynamically Linked

Semi-Linked

Linked Libraries

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What vulnerability is associated with dynamically linked libraries that can lead to loading of malicious libraries designed to mimic legitimate ones needed by the application?

DLL Hijacking

Library Spoofing

Library Overloading

Dependency Injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the dd command line tool in forensics?

Analyzing file metadata

Making forensic images of block-level storage

Creating exact copies of files

Encrypting files at the block level

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does dd differ from traditional file copying methods?

It copies files at the block level

It copies files with encryption

It copies files at the file level

It copies files more efficiently

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What utility allows interactions with connection tracking systems in the Linux kernel for stateful packet inspection?

conntrack

tcpdump

netstat

iptables

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which utility records packet captures for further analysis and can save them using the pcap interface?

iptables

netstat

conntrack

tcpdump

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the `sha256sum` command-line utility do in Linux?

Encrypts files

Analyzes file metadata

Compares files to identify matches

Generates SHA-2 hashes with a digest length of 256 bits

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?