312-49v10 Exam QuestionsBrowse all questions from this exam

312-49v10 Exam - Question 28


If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Show Answer
Correct Answer: D

The presence of files named Zer0.tar.gz and copy.tar.gz on a Linux system alone does not provide enough information to draw a specific conclusion. These files could potentially be operational files, backups, or could contain any number of things that are benign or malicious. To determine their exact nature, further investigation and analysis would be required, including examining their contents, metadata, and any other relevant context.

Discussion

7 comments
Sign in to comment
Famous_GuyOption: D
Jan 30, 2023

D: It's difficult to draw a conclusion based solely on the presence of files named Zer0.tar.gz and copy.tar.gz on a Linux system. These files could contain any number of things and their contents might be benign or malicious. To determine the nature of these files and what they contain, an investigation would have to be performed to examine their contents, metadata, and any other relevant information.

ctaregistroOption: C
Dec 6, 2021

C. The system has been compromised using a t0rnrootkit https://pc-freak.net/tutorials/hacking_info/writeup.txt

K3nz0420Option: C
Mar 6, 2022

C is the correct answer

K3nz0420Option: C
Mar 7, 2022

C sys compromised using t0rnrootkit

sampbOption: C
May 19, 2022

C. seems more logical

torabi123
Nov 5, 2023

This question is a nightmare: In a forensic investigation, it's crucial to be cautious and avoid making assumptions solely based on filenames. File analysis, metadata examination, and additional context are essential to make accurate conclusions and determine whether these files are benign, suspicious, or malicious.

4bd3116Option: C
Jul 17, 2024

The rootkit is a type of rootkit specifically designed for Unix-like operating systems, such as Linux. It is one of the many rootkits used by attackers to gain unauthorized access and maintain control over a compromised system while hiding their presence and activities from system administrators and security tools