Linux Command Lines Flashcards

(58 cards)

1
Q

Prompt to enter new command

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Output specific string of text

A

Echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prints working directory onto the screen

A

Pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Displays names of files and directories in the current working directory

A

ls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Navigates between directories

A

cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Displays the content of a file

A

cat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Displays just the beginning of a file by default 10 lines

A

head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

/home

A

Each user in the system gets their own home directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

/bin

A

This directory stands for “binary” and contains binary files and other executables. Executables are files that contain a series of commands a computer needs to follow to run programs and perform other functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

/etc

A

This directory stores the system’s configuration files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

/tmp

A

This directory stores many temporary files. The /tmp directory is commonly used by attackers because anyone in the system can modify data in these files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

/mnt

A

This directory stands for “mount” and stores media, such as USB drives and hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Displays end of the file by default 10 lines

A

tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Returns the content of a file one page at a time

A

Less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Searches a specific file and returns all lines in the file containing a specified string

A

grep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Searches for directories and files that meet specific criteria

A

Find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sends the standard output of one command as standard input to another command for further processing

A

(vertical line piping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Find files in a directory that contain specific name

A

-name (case sensitive)
-iname (not case sensitive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Finding files or directories modified within a certain time

A

-mtime
-based on days +1 indicates a day ago -1 indicates files less than a day ago

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Creates new directory

A

mkdir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Remove or delete directory

A

rmdir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Create a new file

A

touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Removes or deletes files

A

rm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Moves a file or directory to a new location

24
Copies a file or directory into a new location
cp
25
Displays permissions to files and directories
ls-l
26
Display hidden files
ls -a
27
Display permissions to file and directories including hidden files
ls -la
28
Changes permission on files and directories
chmod
29
Adds a user to the system
useradd
30
Deletes a user from the system
userdel
31
Command to temporarily grants elevated permissions to specific users
sudo
32
Sets the user’s default group also called their primary group
-g
33
Adds the user to additional groups, also called supplementary or secondary groups
-G
34
Command that modifies existing user accounts
usermod
35
Command to append a user to an existing group without replacing existing supplemental group
-a
36
Other options used with usermod
-a appends user to an existing group -d changes users home directory -l changes users login name -L locks the account so user cannot login
37
Command line to delete all files under specific user in their home directory
Userdel -r (username)
38
Command to lock user account without deleting
usermod -L
39
Command to change ownership of file or directory
chown
40
Displays information on other commands and how they work
man
41
Displays a description of a command on a single line
whatis
42
Searches the manual page descriptions for a specified string
apropos
43
Company 2 files byte by byte
cmp file name file name
44
Generate Hash for a file
sha256sum
45
Security controls that manage access authorization, and accountability of information
Access controls
46
AAA framework
Authentication (Who are you?) Authorization (access to Information only last as long as needed) Accounting (practice of monitoring the access logs of a system)
47
Factors of authentication
1) knowledge: something the users knows 2) ownership something the user possesses (random number via text) 3) characteristic something the user is (bio Id)
48
A technology that combines several different logins into one
Single sign on (SSO)
49
Insecurity measure, which require requires a user to verify their identity and two or more ways to access a system or network
Multifactor authentication (MFA)
50
The principal that users should not be given levels of authorization that would allow them to misuse a system
Separation of duties
51
The technology used to establish a user request to access a server
Basic auth 
52
O auth
An open standard authorization protocol that shares designated access between applications
53
A small block of encrypted code that contains information about a user
API token
54
Sequence of network HTTPbasic authorization request and responses associated with the same user
Session
55
Unique, talking that identify a user and their device will access in the system
Session ID
56
He took that website used to validate a session and determine how long that session should last
Session cookie
57
An event when attackers obtaining legitimate users session ID
Session hijacking