CSCI 4612 Final (Outsourced)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is Snort?

An intrusion detection service

The Linux open source license, referred to as GNU General Public License (GPL), requires which of the following?

Any software based on GPLed software retains the same rights as the original software

Keeping secrets is the essence of which tenet of the C-I-A triad?

Confidentiality

What is the CUPS service associated with?

Printing

The cron and at services enable you to schedule tasks in Linux. True or False?

True

Wireless encryption algorithms such as WPA and WPA2 may be cracked if they use weak pre-shared keys based on dictionary words. True or False?

True

Which mounting option enables user quotas on a filesytem? 1) usrquota 2) enable quotas 3) edquota 4) rw

usrquota

What is Apache?

A Web server

If the kernel file is overwritten with a binary that doesn't work or if the file is erased, the system won't boot again until the kernel file is replaced. True or False?

True

The iptables -j DROP and -j REJECT command options both drop packets. True or False?

True

Which of the following is associated with wireless intrusion detection system (WIDS)?

Wi-Fi Protected Access (WPA)

Regarding SELinux, which of the following files includes lists of critical files and services to be watched for changes?

sestatus.conf

Which of the following is usually about preventing a party involved in a transaction from denying that the transaction occurred?

Nonrepudiation

Which file is used to configure the various mounting options of a filesystem upon boot?

/etc/fstab

Configuring a user account policy with minimum password length, maximum days for using a password, and various user logins can be performed by editing the ________ file.

/etc/login.defs

From which of the following files does the iptables command read ports of well-known services?

/etc/services

Which of the following files is NOT a part of the shadow password suite? 1) /etc/shadow 2) /etc/group 3) /etc/passwd 4) /etc/sudoers

/etc/sudoers

Which file permission is NOT an example of discretionary access control? 1) Read 2) Write 3) Execute 4) Boolean

Boolean

A user needs access to execute networking-related commands only. What type of access should be granted using the principle of least privilege?

The user should be given sudo access to NETWORKING.

Alternate attack vectors include connections through telephone modems and serial ports. True or False?

True

Cron is a service for running administrative jobs on a regular basis. True or False?

True

Files on a device are accessible only when they're mounted on a Linux directory. True or False?

True

Pluggable authentication modules (PAM) offers a number of ways for users to be authenticated on a Linux system. True or False?

True

When configuring obscure ports for a service, configuring different ports for clients and servers is not enough. You also need to configure an open port in the firewall. True or False?

True

The _________ part of the kernel contains drivers and options essential to the kernel boot process.

monolithic

What is the best definition of a firewall?

Hardware or software capable of blocking networking communications based on established criteria, or rules

Assuming a demilitarized zone (DMZ) is configured, there's no need to set up a separate firewall between the DMZ network and the internal network. True or False?

False

The identifiers ext4, FAT32, and NTFS are types of kernels. True or False?

False

You used a protocol analyzer to capture some network traffic. You want to focus on FTP traffic. What port should be used?

21

Whereas the cron service is a scheduler for jobs to be run on a one-time basis, the at service is a scheduler for jobs to be run on a regular basis. True or False?

False

The iptables -s <ip_address> rule is applied to packets that come from the noteddestination address. True or False?

False

The ls -p command displays file and folder permissions. True or False?

False

Which of the following is the development distribution for Red Hat? Fedora, Ubuntu, Mint, Debian

Fedora

The following are true of system hardening EXCEPT: 1) A hardened system is more resistant to attack. 2) It involves removing all but the most critical users from the system. 3) A hardened system usually has more packages to update than an unhardened system. 4) It involves ensuring permissions are restricted on files and directories.

It involves removing all but the most critical users from the system.

What does Red Hat Enterprise Linux use to install software packages?

Red Hat Package Manager (RPM) and Yellowdog Update, Modified (yum)

Which of the following enables a Linux system to be used as a Windows domain controller to authenticate Windows users? 1) Samba 2) A modular kernel 3) GRUB 4) LILO

Samba

Which of the following represents a type of mandatory access control? 1) A user cannot open the /etc/shadow file to read because the file is owned by user and group root. 2) The FTP service is allowed to interact with directories other than users' home directories. 3) A user gives a group permission to read the /var/log file. 4) A user can give read, write, and execute permissions to a file.

The FTP service is allowed to interact with directories other than users' home directories.

A rainbow table is a set of precomputed stored hashes that are mapped to a plaintext password. True or False?

True

In Linux, three major services that network files and folders are the Network File System (NFS), Samba, and the File Transfer Protocol (FTP). True or False?

True

The iptables -R command replaces a rule in a chain of rules. True or False?

True

The most common standard for file encryption on Linux is based on GNU Privacy Guard (GPG). True or False?

True

You can use specific iptables rules to prevent denial of service (DoS) attacks. True or False?

True

Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated with password databases.

pluggable authentication modules (PAM)

A discretionary access control for a file is a control mechanism that is set by _______.

the user owner of the file

Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext. True or False?

true


Ensembles d'études connexes

Chapter 5 Fill-in-the-Blank (book)

View Set

تاريخ الاردن الوحدة الثانية

View Set

Exam 2 - Bone fracture Classifications

View Set

Absolute and Difference Thresholds

View Set

Chapter 12: Statement of Cash Flows

View Set

5. What is the Coriolis effect? What impact does it have on global circulation?

View Set

Solving Quadratic Equations by Completing the Square and Square Roots

View Set

Unit 6: Lesson 2: LS Assignment 2

View Set