Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CPSA Unix Security Assessment Questions with Complete Solutions

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
10-04-2026
Written in
2025/2026

CPSA Unix Security Assessment Questions with Complete Solutions

Institution
CPSA
Course
CPSA

Content preview

CPSA Unix Security Assessment
Questions with Complete Solutions7

What R* services can be used for user enumeration? - ANSWERS-rusers, rwho.



What does rwho do? - ANSWERS-Reports information on logged on users on a remote host.



What does rwho do? - ANSWERS-Reports all users logged onto machines in the local network.



How can users be enumerated with SMTP? - ANSWERS-VRFY or RCPT TO command.



What does finger do? - ANSWERS-Finger is a program that can be used to find information
about users of a system. It usually lists the login name, the full name, and possibly other details
about the user you are fingering. This is a dated service that was used to determine who was
currently on a device. Gets it information from /etc/passwd.



What ports are used for FTP and for what reasons? - ANSWERS-20 - data and 21 - command



What kind of access allows any users to interact with an FTP service? - ANSWERS-Anonymous



What could be risk of allowing anyone to write to FTP service? - ANSWERS-Potential upload into
code execution, obtaining sensitive files, identifying vulnerable version.



What is a mail relay? - ANSWERS-SMTP relay lets users send e-mails through external servers.
Spammers and hackers can use an e-mail server to send spam or malware through e-mail under
the guise of the unsuspecting open-relay owner.

, What is CVE-2003-0694? - ANSWERS-The prescan function in Sendmail 8.12.9 allows remote
attackers to execute arbitrary code via buffer overflow attacks.



What is CVE-2003-0161? - ANSWERS-A buffer overflow has been reported in the prescan()
function of Sendmail versions 8.12.9 and earlier. The overflow can be exploited to execute
arbitrary code on the system.



What is CVE-2002-1337? - ANSWERS-Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote
attackers to execute arbitrary code via certain formatted address fields, related to sender and
recipient header comments as processed by the crackaddr function of headers.c.



What is NFS? - ANSWERS-NFS is Network File System, a legacy protocol providing network based
file services. Allowing files to be accessed as they would be locally.



How can NFS be restricted? - ANSWERS-The etcexports file can be altered to add a policy
restricting access to certain hosts or directories. The SUID bit can be disabled too.



What is Root Squash? - ANSWERS-Root Squashing remaps the root user to an anonymous user
in NFS. The no_root_squash needs to be changed to root_squash to prevent this.



What options can be set to restrict what can be done to abuse NFS? - ANSWERS-NoExec -
prevents execution of binaries on the system. NoSuid - prevents suid being used on the system.
This is when connecting via NFS.



How can restricted files be accessed via UID/GID manipulation in certain NFS setups? -
ANSWERS-Auth relies on UID and GID from the OS. You can change the UID in a VM to match
that of the target and get their permissions.



What do the /etc/hosts.equiv and.rhosts files do and what are the differences? - ANSWERS-
Gives a specified user(s) permission to log in remotely from the specified host without having to

Written for

Institution
CPSA
Course
CPSA

Document information

Uploaded on
April 10, 2026
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$21.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bensuda Oxford University
Follow You need to be logged in order to follow users or courses
Sold
886
Member since
3 year
Number of followers
445
Documents
22938
Last sold
4 hours ago
ECONOMICS,NURSING,BIOLOGY AND ALL REVISION MATERIALS

DEDICATED TO PROVIDE YOU WITH THE BEST LEARNING MATERIALS THAT WILL IMPROVE YOUR GRADES ,WELCOME TO ALIZGRADES AND LETS DO IT TOGETHER!!! GOODLUCK!!!!!!!

3.7

164 reviews

5
77
4
25
3
25
2
11
1
26

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions