Sponsored Content
Top Forums Shell Programming and Scripting How to remove answers and explanation parts from a text file with lots of questions.? Post 303041668 by Neo on Monday 2nd of December 2019 12:16:34 AM
Old 12-02-2019
The problem I have is trying to match multiple lines using sed or egrep, so I did not quickly find a way to filter out the Explanation text. The rest was easy (plus I removed the stray number and the "New questions" phrase):

Code:
sed 's/NO./\nNO./' test.txt |egrep -v '^Answer|^Explanation|^New questions|^[0-9]'

Leaving an incomplete solution because of the requirement for a multiline regex match:

Code:
ubuntu# sed 's/NO./\nNO./' text.txt |egrep -v '^Answer|^Explanation|^New questions|^[0-9]'

NO.13 Darius is analysing IDS logs. During the investigation, he noticed that there was nothing
suspicious found and an alert was triggered on normal web application traffic. He can mark this alert
as:
A. False-Negative
B. False-Positive
C. True-Positive
D. False-Signature

NO.14 What is the proper response for a NULL scan if the port is closed?
A. SYN
B. ACK
C. FIN
D. PSH
E. RST
F. No response

NO.15 The Open Web Application Security Project (OWASP) is the worldwide not-for-profit
charitable organization focused on improving the security of software. What item is the primary
concern on OWASP's Top Ten Project Most Critical Web Application Security Risks?
A. Injection
B. Cross Site Scripting
C. Cross Site Request Forgery
D. Path disclosure
IT Certification Guaranteed, The Easy Way!
The top item of the OWASP 2013 OWASP's Top Ten Project Most Critical Web Application Security
Risks is injection.
Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an
interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into
executing unintended commands or accessing data without proper authorization.
References: https://www.owasp.org/index.php/Top_10_2013-Top_10

NO.16 A recent security audit revealed that there were indeed several occasions that the company's
network was breached. After investigating, you discover that your IDS is not configured properly and
therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?
A. True Positive
B. False Negative
C. False Positive
D. False Positive

NO.17 A Network Administrator was recently promoted to Chief Security Officer at a local university.
One of employee's new responsibilities is to manage the implementation of an RFID card access
system to a new server room on campus. The server room will house student enrollment information
that is securely backed up to an off-site location.
During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned
that the existing security controls have not been designed properly. Currently, the Network
Administrator is responsible for approving and issuing RFID card access to the server room, as well as
reviewing the electronic access logs on a weekly basis.
Which of the following is an issue with the situation?
A. Segregation of duties
B. Undue influence
C. Lack of experience
D. Inadequate disaster recovery plan

In practice, I would do this in PERL or PHP because of the required multiline matches; but I'm sure someone else can do a much better command line than me.
 

10 More Discussions You Might Find Interesting

1. Red Hat

Lots of questions about linux.

I am about 2 months new to Linux, and have only limited experience with PCLinuxOS, (kde) and Redhat. I am installing the latest version of PClinuxOS on my wife's PC right now but running into a problem I dont understand. I have never seen it before so i thought i'd ask how I can get around it.... (1 Reply)
Discussion started by: Methal
1 Replies

2. Solaris

expecting answers for these questions?

hi all plese clarify me in the following area. 1. What is the default NFS version in solaris 5.10. If it is 3, then why it asks me to specify "-o vers=3" keyword while i am mounting a share from a RHEL 5.1 Server? 2. Can someone give the link to download packages for accessing "ntfs"... (4 Replies)
Discussion started by: kingston
4 Replies

3. Solaris

solaris 10 OS administration interview questions and answers

Hello, I am new to this forum and I am preparing for interview .Kindly can anybody send me Solaris 10 OS administration interview questions and answers (2 Replies)
Discussion started by: meet2muneer
2 Replies

4. Solaris

Please give answers for this interview questions

I was not able to get answers for these interview questions. It will be appreciable and useful if any one answers this questions. (5 Replies)
Discussion started by: Sesha
5 Replies

5. UNIX for Dummies Questions & Answers

Homework questions, book is lacking answers?

Hey you guys, There's a couple questions I cannot find the answers to anywhere in this book for my Operating Systems class, hopefully you guys could help. I believe we are in the Bourne shell. 1. Match each description to the appropriate type of variable Used in shell programs ... (7 Replies)
Discussion started by: KyleBucket
7 Replies

6. Post Here to Contact Site Administrators and Moderators

Eric's Questions and Answers Blog

I hope this is ok so I will ask if I may use this thread to ask questions about programming. May I use this thread to ask questions and answer questions? If the answer is yes, this is a thread made for minimizing the amount of threads I post to ask questions about programming. Please feel... (3 Replies)
Discussion started by: Errigour
3 Replies

7. UNIX for Advanced & Expert Users

Interview questions and answers on HP Unix administration

Hi, Can some body help me to get Interview questions and answers on HP Unix administration? Thanks Krsnadasa (1 Reply)
Discussion started by: krsnadasa
1 Replies

8. UNIX for Dummies Questions & Answers

Help with deleting some parts from text file

Hi all, I have a fat file which contains something like this: ************************************************ blahblahblah blahblahblah Myobject1 HOME ( homecontents01 ( some junk; ) home contents02( some junk; ) ... (7 Replies)
Discussion started by: newboy
7 Replies

9. UNIX for Beginners Questions & Answers

Answers for few objective questions.

Hi Unix geniuses, I need your help for the answers of few objective Q&A. i dont know if my answers are correct or not. So i really need your help to provide the answers which will help me in unix programming. (1 Reply)
Discussion started by: Vivekit82
1 Replies

10. What is on Your Mind?

Answers to Recently Asked Questions about UNIX.COM

Here are some answers to some of the recent questions I have received about UNIX.COM. So, I thought I would take time to answer them here in this post: Is it expected that the original poster "thank" everyone who responds to his / her discussion thread? It is always a good practice in all... (7 Replies)
Discussion started by: Neo
7 Replies
UP2DATE(5)							   Red Hat, Inc.							UP2DATE(5)

NAME
up2date - Configuration file for Red Hat Network client programs. DESCRIPTION
Red Hat Network client programs, such as rhn_check(8), use a common configuration file at /etc/sysconfig/rhn/up2date. OPTIONS
enableProxy Use a HTTP Proxy. Can be either 0 (False) or 1 (True). serverURL Remote server URL debug Whether or not debugging is enabled. Can be either 0 (False) or 1 (True). systemIdPath Location of system id file. Expects the path of a file on disk. versionOverride Override the automatically determined system version. Expects a string or blank (do not override the version). httpProxy HTTP proxy in host:port format, e.g. squid.redhat.com:3128 proxyUser The username for an authenticated proxy. proxyPassword The password to use for an authenticated proxy. enableProxyAuth To use an authenticated proxy or not. Can be either 0 (False) or 1 (True). networkRetries Number of attempts to make at network connections before giving up. Expects a positive integer. sslCACert The CA cert used to verify the ssl server. Expects the path of a file on disk. noReboot Disable the reboot action. Can be either 0 (False) or 1 (True). disallowConfChanges Config options that can not be overwritten by a config update action. Expects a semi-colon separated list of config option names. hostedWhitelist Override the default list of URLs the RHN Register client treats as official RHN hosted servers. This only affects the RHN Register graphical- and text-based clients, as it changes some of the options that appear. This option is included for testing purposes only. retrieveOnly If set to 1 (True), package installs done through rhn_check will only download the package, the package will not be installed. FILES
/etc/sysconfig/rhn/up2date The location of this configuration file SEE ALSO
rhn_check(8), rhn_register(8), rhnreg_ks(8), rhnsd(8), rhn-profile-sync(8), rhnplugin(8), rhnplugin.conf(5). AUTHORS
See the AUTHORS file included with this software. This manual page was written by James Bowes <jbowes@redhat.com> BUGS
Report bugs to <http://bugzilla.redhat.com>. COPYRIGHT
Copyright (C) 1999-2010 Red Hat, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICU- LAR PURPOSE. Linux 2010 August 30 UP2DATE(5)
All times are GMT -4. The time now is 12:40 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy