Exam 1 Study Guide
A blacklist is a list of things you want to allow, such as IP addresses or systems.
false
A hypervisor is a software interface designed specifically for virtual machines with limited resources.
false
A rainbow table is a set of precomputed stored hashes that are mapped to a plaintext password.
false
GNU's Not Unix (GNU) refers to commercial versions of Linux software.
false
Infrastructure as a Service (IaaS) provides a complete Web application solution for easier application development.
false
LILO is the default boot loader for Ubuntu, Red Hat, and many other Linux distributions.
false
Service startup scripts have names that begin with an S followed by a two-digit number, which specifies the order in which the service will start up.
false
The process of fixing commercial software is typically less constrained by human resource issues than open source software projects.
false
Pluggable authentication modules (PAM) solves administrative permission problems by providing higher-level functions without having the whole program gain administrative access
false ?
In the password shadow suite, the difference between /etc/shadow and /etc/gshadow is that with /etc/gshadow, passwords are rarely configured.
true
Linux can operate as a hypervisor in and of itself, so it can also run as a guest operating system inside any other hypervisor.
true
Mint is a derivative of the Debian distribution.
true
Most Linux distributions have pre-compiled packages, which determine all the dependencies.
true
SELinux and AppArmor provide mandatory access controls
true
Source-based distributions of Linux enable you to decide how many packages you want to include in it.
true
The Linux open source license allows anyone to use, modify, and improve the source code.
true
The init and systemd programs start up Linux services
true
An administrator typically stops and starts services using the init program.
false
A hardened Linux system typically contains fewer packages to be monitored for updates in case vulnerabilities are found in the software.
true
A server distribution's kernel may be tuned differently than a desktop distribution.
true
A threat vector describes a way for an attacker to get into a system
true
All packages in a source-based distribution of Linux must be compiled from source.
true
In Linux, every user and group has a user ID (UID) and group ID (GID) number
true
In a Linux system, a smaller number of packages means a smaller surface area for attack.
true
The init process is the super process that is responsible for starting all processes other than those specified by the runlevel during system startup.
true
The primary boot loaders in Linux are Grand Unified Bootloader (GRUB) and Linux Loader (LILO).
true
The term "attack surface" indicates the total number of vulnerabilities a system might have
true
The term "copyleft" is associated with the GNU General Public License (GPL).
true
Using nonstandard Transmission Control Protocol/Internet Protocol (TCP/IP) suite port numbers for key services can slow the efforts of attackers who want to break into a system
true
You can set the runlevel by using the init command and passing the runlevel to it.
true