ITSY 2300

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is the development distribution for Red Hat?

Fedora

The default mandatory access control system used for Red Hat distributions is

SELLinux.

What is Apache?

Software package used to provide web services

What is the CUPS service associated with? a. File transfers b. E-mail c. Remote access d. Printing

d. Printing

Cron is a service for running administrative jobs on a regular basis.

true

Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext.

true

A hypervisor is a software interface designed specifically for virtual machines with limited resources

false

In the shadow password suite, the /etc/passwd file may store a hashed password for a group.

false

Iptables cannot perform network address translation.

false

LILO is the default boot loader for Ubuntu, Red Hat, and many other Linux distributions

false

Most Linux distributions currently use a package called ipchains as firewall software

false

Regular Linux users may not be given administrative privileges to run administrative commands from regular accounts.-

false

The C-I-A triad is an expansion of the Parkerian hexad.

false

The latest versions of Linux use the syslogd and klogd service daemons to configure logging for services and the kernel.-

false

The C-I-A triad is the core and defining set of concepts with respect to information security

true

The sg command allows a user to join a group on a temporary basis

true

Which of the following is the key difference between Ubuntu and Linux Mint?

Ubyntu has used GNOME the unity desktop environment, mint team has developed two different desktop environment called mate and cinnamon.

The Linux open source license, referred to as GNU General Public License (GPL), requires which of the following?

Any software based on GPLed software retains the same rights as the original software

. The following are true of system hardening EXCEPT: 1) A hardened system is more resistant to attack.2) It involves removing all but the most critical users from the system.3) A hardened system usually has more packages to update than an unhardened system.4) It involves ensuring permissions are restricted on files and directories.

It involves removing all but the most critical users from the system.

Which of the following is true regarding open source software versus commercial software?

It is free - You can learn from the source code. - You can see clearly what it does. - You can have a better understanding of how the program operates. - You can make fixes to the source in case there are bugs if you are so inclined. - Open source projects put their source code out on the open Internet at public repositories.

Which of the following is usually about preventing a party involved in a transaction from denying that the transaction occurred?

Nonrepudiation

. A Linux distribution typically does NOT include which of the following?

Virtual platform, Userland, Package-management system, Kernel

Which of the following statements is true about using a mandatory access control system on Linux? a. Properly setting up a mandatory access control system requires discipline and configurationknowledge. b. A mandatory access control system adds overhead to the kernel that renders it unnecessaryto use. c. A mandatory access control system on Linux is generally considered to be a security risk. d. A mandatory access control system cannot be used in conjunction with a firewall.

a. Properly setting up a mandatory access control system requires discipline and configurationknowledge.

Which of the following enables a Linux system to be used as a Windows domain controller to authenticate Windows users? a. Samba b. A modular kernel c. GRUB d. LILO

a. Samba

The read, write, and execute permissions of a file are an example of a ________. a. discretionary access control b. firewall control c. mandatory access control d. system kernel control

a. discretionary access control

The _________ part of the kernel contains drivers and options essential to the kernel boot process. a. monolithic b. modular c. live d. None of the above

a. monolithic

__is targeted toward power users who like to have complete customization control over how their packages are built and added to the system. It also uses a package-management tool called pacman.

arch linux

What defines the services to be run in Linux? a. GRUB b. Runlevel c. LILO d. TCP Wrappers

b. Runlevel

Which file permission is NOT an example of discretionary access control? a. Read b. Write c. Execute d. Boolean

b. Write

Postfix and Exim are types of _____________. a. graphical desktop environments b. FTP server packages c. SMTP server packages d. Web server packages

c. SMTP server packages

The iptables program is used to configure ___________. a. a mandatory access control b. user account information c. a firewall d. TCP Wrappers

c. a firewall

Which of the following files is NOT a part of the shadow password suite? a. /etc/shadow b. /etc/group c. /etc/passwd d. /etc/sudoers

d. /etc/sudoers

Apache is a popular type of _____________. a. graphical desktop environment b. e-mail server package c. Web browser d. Web server package

d. Web server package

. In Linux, software for network services, graphical user interfaces (GUIs), language compilers, and many other kinds of software typically come in bundles referred to as

packages

A rainbow table is a set of precomputed stored hashes that are mapped to a plaintext password

true

In a Linux system, a smaller number of packages means a smaller surface area for attack.

true

In the user private group scheme, Linux users are typically assigned to at least one group, which is based on that user's account.

true

Log files that record login attempts and login failures classify log messages as auth and authpriv.

true

Pluggable authentication modules (PAM) allows users to be authenticated with local password stores and by way of network authentication, using facilities like Network Information Service (NIS) and the Lightweight Directory Access Protocol (LDAP).

true

To give administrative access to individual utilities to specific users, you can use the sudo command and configure access using the /etc/sudoers file.

true

You are a computer security consultant who has been hired by a company to break into its network and protected systems to test and assess their security. Which of the following describes your role?

white hat hacker

. What does the Parkerian hexad include that the C-I-A triad does not?

· Possession or control · Authenticity · Utility

A discretionary access control for a file is a control mechanism that is set by. a. the root user b. a system administrator c. the GRUB d. the user owner of the file

d. the user owner of the file

. Fedora and Ubuntu are examples of

distributions.

What are the advantages of virtualization in a Linux infrastructure?

I. Cost savings by purchasing less hardware II. Managing a single physical system with many different functions III. Managing several physical systems, each with a unique function

Who developed and released the first Linux operating system?

LINUS TORVALDS

Which of the following is an open source license?

GNC General Public License (GPL)

What is the best definition of a firewall?

Hardware or software capable of blocking networking communication based on rules.

In the LILO configuration file (/etc/lilo.conf), what is the purpose of the password= line under the image specification?

This option asks the user for a password when trying to load the Linux system in single mode.

What does Red Hat Enterprise Linux use to install software packages?

rpm

. What is Canonical?

Canonical is the privately held corporate sponsor behind the ubuntu distribution.

Keeping secrets is the essence of which tenet of the C-I-A triad?

Confidentiality

What is the best definition of a bastion?

A fortified place


Conjuntos de estudio relacionados

Anatomy Lab Test: Exercises 8-11

View Set

Business Law 235: Chapter 9 Contract Law (Questions Whether it is Contract Law or Not)

View Set

(1.1) Introduction to Psychology

View Set