Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Linux OS Security End of Course Prep Questions And Answers

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
03-07-2023
Written in
2022/2023

When viewing the permissions for the /tmp/ directory, what should you expect to see? A.rw-rwx--x B.rwxrwxrwx C.rwxrwxrwt D.--------- E.r-xrwxrwt - Answer- C.rwxrwxrwt Which of the following will create an archived file named from the contents of your documents directory? A.tar -c ~/Documents B.tar ~/Documents C.~/Documents | tar D.tar -cf ~/Documents E.tar ~/Documents - Answer- D.tar -cf ~/Documents What key is used to exit the less command? A.a B.x C.t D.q E.? - Answer- D.q When provisioning a Raspberry Pi device where is the OS stored? A.On a hard drive that is built into the device B.In the BIOS C.On a removable SD card inserted into the device D.There is no OS on a Raspberry Pi - Answer- C.On a removable SD card inserted into the device What symbol indicates that you are authenticated to root? A.! B.# C.& D.$ - Answer- B.# Which of the following is a difference between a SSD and HDD (Choose 2) A.SSD are indestructible and last forever B.HDD are much slower than a SSD C.A SSD always has a larger capacity D.SSD appear as hidden directories in Linux E.A SSD has no moving parts and a HDD does - Answer- B. HDD are much slower than a SSD E. A SSD has no moving parts and a HDD does

Show more Read less
Institution
Course

Content preview

Linux OS Security End of Course Prep Questions And
Answers
What program could you use to conduct a technical vulnerability scan of a Linux host? -
Answer- A. Nessus

When connecting to an untrusted wireless access points how can you increase your
security and safety of using that access point? - Answer- A. Use a VPN to encrypt your
traffic

What service would you use to schedule a script to run at a certain pre-determined
time? - Answer- A. cron

What does the command find / -xdev -nouser do? - Answer- A. Finds files that belong to
user accounts that are no longer on the system

Which documents or resources can you review for guidance on hardening a Linux
system: - Answer- ALL OF THESE

A. NSA hardening guide

B. DISA STIG

C. National Vulnerability Database

D. All of these

In a hardened Linux environment the firewalls default policy should be - Answer- B.
Deny All (or Drop)

What base directory would you put a script in if you wanted it to automatically start when
the operating system starts? - Answer-

If you use GRUB to manage different boot options on your Linux host and want to
increase security especially for physical access you should - Answer- A. Configure
GRUB to prompt for a password to boot a partition

127.0.0.1 is an example of what type of address? - Answer- A. IPv4

What program allows you to interactively execute programs or commands as the root
user? - Answer- A. sudo

An attacker who places an entry such as 74.213.42.219 www.cmu.edu in the /etc/hosts
file could redirect users to a malicious server. - Answer- A. True

, What is Unified Extensible Firmware Interface designed to do? - Answer- A. Prevent
malicious actors from modifying the boot loader or booting the computer with a different
operating system

Single user mode in Linux is a security risk if a malicious actor has physical access to
the host. - Answer- A. True

Bro, Snort, Suricata are examples of what kind of Linux security feature? - Answer- A.
Network Intrusion Detection Systems

Misconfigurations are a more likely security threat than viruses on Linux. - Answer- A.
True

What type of attack is enabled by lack of input validation in applications? - Answer- A.
SQL injection

What program should be used to change a user password? - Answer- A. passwd

Package repositories are collections of software and source files used by package
management systems to install, update, and remove software on a Linux system. -
Answer- A. True

In addition to the internal authentication via /etc/passwd and /etc/shadow files, what
services can be used to authenticate users to a Linux host? - Answer-

GID UID and EUID stand for: - Answer-

You can use SSH to tunnel and encrypt traffic between a client and a server. - Answer-
A. True

2003:da3:1637:ffff:ffff:ffff:ffff:ffff is an example of what type of address? - Answer- B.
IPv6

What Linux security feature can be used to log, drop, reject, or alter packets? - Answer-
A. IPTables

Scripting is a good way to automate manual or time intensive tasks such as backups or
running programs on a scheduled basis or monitoring and checking system settings. -
Answer- A. True

What tool could you use to monitor current file system activity? - Answer- A. LSOF

What programs could you use to remotely interact with a Linux system? - Answer- ALL
OF THESE
A. NX

Written for

Course

Document information

Uploaded on
July 3, 2023
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
Follow You need to be logged in order to follow users or courses
Sold
2098
Member since
4 year
Number of followers
1446
Documents
53693
Last sold
2 hours ago

3.8

358 reviews

5
177
4
61
3
48
2
17
1
55

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions