Linux+ Chapter 14 Security, Troubleshooting, and Performance

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

%nice value

%of time processor spent executing user programs and daemons

sar -d

I/O stats for each block device

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

what is the average time of a computer equipment?

2-3 years

Remote Dial In User Service (RADIUS)

Client-server protocol that provides AAA services that can be implemented on the network

sudoedit command

Edit text files into such as configuration files as the root user

firewall-cmd --add-port=port

Enable(allow) the specified port within the current network zone

firewall-cmd --add-serveice=service

Enable(allow) the specified service within the current network zone

Tunnel mode

Encryption for all IP packets that travel between two routers

Hashes

checksum of a certificate

Netfilter

The Linux kernel component that provides firewall and NAT capability on modern Linux systems.

visudo command

The command in Fedora 13 used to edit the /etc/sudoers file

Uncomplicated firewall

UFW is a simplified front end for IPtables

Computers open in the public should have their BIOS changed to prevent booting from ______________________ and set ___________

USB ports BIOS Password

how can you change the sar logging interval?

editing the /etc/cron.d/sysstat cron table

what is self-signed certificated used for?

for SSL/TLS connection

Network zone home

mutable-for trusted home network connections

what is an INPUT chain?

network packets destined to your computer

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

tcpdump command

used to examine traffic that is passing from and to your network. same as wireshark

aa-status command

view processes managed by AppArmor

tshark command

wireshark in command line

Which of the following commands can be used to display memory statistics?

-free -sar -vmstat

how do you make sure that the iptables are loaded at each boot?

-install the iptables-persistent package -iptables-save /etc/iptables/rules.v4 command

Where does the Ubuntu load default firewalls?

/etc/default/ufw

where is the custom network zone configuration stored at?

/etc/firewalld/zones

Location of the PAM files in Ubuntu

/etc/pam.d/common-password or /etc/pam.d/common-auth

Location for the PAM files in Fedora

/etc/pam.d/password-auth or /etc/pam.d/system-auth

aa-complain command

A command used to set an AppArmor profile to complain mode.

aa-enforce command

A command used to set an AppArmor profile to enforce mode.

Network zone

A component of firewalld that defines the level of trust for network connections.

sar -u

Displays CPU stats

firewall-cmd --get

Displays all available networks

firewall-cmd --list-all-zones

Displays the services that are enabled (allowed) for the current network zone

firewall-cmd --remove-port=port firewall-cmd --permanent

Ensure that the specified port is disabled(disallowed) within the current network zone at boot time

firewall-cmd --remove-service= firewall-cmd --service --permanent

Ensure that the specified service is disabled(disallowed) within the current network zone at boot time

firewall-cmd --add-service=service firewall-cmd --permanent

Ensure that the specified service is enabled(allowed) within the current network zone at boot time

AppArmor is enable by default in Fedora Linux. True or False?

False

ipset command

IP set that includes the appropriate set of hosts and networks which you want to either block or allow using firewall

Login Banner

In a Cisco router or switch, a text message that the router/switch displays for the user during the login process.

What is one of the most important security-related practices for computer and server closet?

Limiting Physical Access

Monitoring

Linux Administrators involves examining log files and running performance utilities periodically to identify problems and their causes

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

audit2why command

generates easy-to-read descriptions of SELinux related events

udevadm command

identifies the unique attributes of the bus ID and device ID

Network zone block

immutable-Deny all incoming connections, which ICMP host-prohibited messages issued to the sender

Network zone drop

immutable-Deny all incoming connections; outgoing ones are accepted

Documentation

logs that are being printed or stored separately to keep during a system failure

iftop command

measure the badwidth from the network interface to each system

iostat command

measures flow of information to and form disk devices

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

how do you unlock an user using pam_tally2/faillock?

pam_tally2/faillock --reset --user <name>

bus mastering

peripheral devices that perform a great deal of processing that is normally performed by CPU

what do you need to do to enable sar on Ubuntu?

set ENABLED="true" within the /etc/default/sysstat file

SElinux label

sets of preconfigured SElinux policies

To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

true

What does SELINUXTYPE = mls

use MLS attributes instead of type classifications

ufw command

used to set the uncomplicated firewall

How can you prevent public computers to be restarted using the Ctrl+Alt+Del in Systemd?

run systemctl mask ctrl-alt-del.target command

sar -o file_name

saves ouput to a file in binary format

iptables -s address

source address of the packet

iptables -sport port#

specifies port # of a rule

sar -w

swapping stats

brctl command

view or modify the bridge configuration used by the Linux kernel for the network adapter

tload

view system load average values

when you move a file that has an SELinux label to a new directory, the files will have the label from the new directory. True or False?

False

The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?

False (locks them after # of unsuccessful attempts)

iptables -R number

Replaces a rule for a chain specified

sar -n ALL

Reports all network statistics

Network zone trusted

immutable-allow all network connections

ioping (input/ouput ping) command

monitors performance of a specific storage device

Which of the following UFW commands can be used to view configured firewall rules?

ufw status

setsebool

Sets specific SE linux rules on or off

cryptsetup command

Sets up LUKS after installation

When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

False

GNU Privacy Guard (GPG)

Free and open-source software that is commonly used to encrypt and decrypt data.

sar -v

kernel-related filesystem stats

Network zone internal

mutable-Internal network, restrict incoming connections

Network zone Public

mutable-Public areas, do not trust other computers

Network zone external

mutable-for computers with masquerading enabled, protecting a local network

iptables -p protocol

specifies the protocol type o for a rule

What does the SELinux labels consist of?

user:role:type:level

faillock command

List users who have been locked out by pam_faillock.so

iptables -L chain

Lists rules of a certain chain

What are best practices for securing a local Linux server?

Lock the server in a server closet -Ensure SELinux and AppArmor is used -encrypt files and network traffic

ARP command

displays MAC addreses cache

biometric

uses unique physical characteristics such as fingerprints, retinal scans, or voiceprints to authenticate

how can you manage network zones and firewall rules?

/etc/firewalld/zones directory using the firewall-cmd command

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

while using the vi editor, what command you must use in order to save your changes superseding the underlying file permissions?

:w!

self-signed certificate

A certificate that lacks a third-party signature.

uptime command

A command that displays the amount or percentage of time a computer system or associated hardware is functioning and available for use.

sudo command

A command that is used to perform commands as another user via entries in the /etc/sudoers file.

gpg command

A command used to create and manage GPG keys.

free command

A command used to display memory and swap statistics.

firewall daemon (firewalld)

A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.

firewall configuration utility

A graphical firewall configuration utility within Fedora 20.

Security Information and Event Management (SIEM)

A method for analyzing risk in software systems. It is a centralized collection of monitoring of security and event logs from different systems. SIEM allows for the correlation of different events and early detection of attacks.

Nmap

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner.

Lightweight Directory Access Protocol

A protocol used to access and query directory services systems such as Microsoft Active Directory.

server closet

A secured room that stores servers within an organization.

Security Enhanced Linux (SELinux)

A set of Linux kernel components and related software packages that prevent malicious software from executing on a Linux system.

System Statistics (sysstat) package

A software package that contains common performance monitoring utilities, such as mpstat, iostat, and sar.

Common Vulnerabilities and Exposures (CVE)

A standard that enables security devices to share information about attack signatures and other vulnerabilities so that they can work together to protect networks.

what is a popular SIEM open source tool among security personnel?

Alientvault Open Source SIEM OSSIM

buffer overrun

An application error that occurs when more data is sent to a program buffer than it is designed to handle.

one-time password (OTP)

An authentication code that can be used only once or for a limited period of time.

iptables -D number

Deletes a rule for a chain specified

firewall-cmd --remove-port=port

Disable(disallow) the specified port within the current network zone

firewall-cmd --remove-service=service

Disable(disallow) the specified service within the current network zone

getsebool

Displays SE Linux variables

getenforce

Displays SE linux status

firewall-cmd --get-services

Displays a list of names used by firewalld to identify network

iostat

Displays information about terminal, disk, and tape input/output activity

sar -r

Displays memory and swap stats

firewall-cmd --get-active-zones

Displays the network interfaces that are active for each network zone

firewall-cmd --zone=zone --list-all

Displays the services that are enabled(allowed) for the specified network zone(zone)

Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

False

Vulnerability Scanner

Generic term for a range of products that look for vulnerabilities in networks or systems.

sar -f file_name

Info from the specified file

what must be done prior to using the aa-complain, aa-disable and aa-enforce commands?

Install apparmor-utils package

TCP Wrappers

Is a program that can start a network daemon

if the system has ahigh %sys compared to %usr and %nice, what is likely happening?

It's executing too many resource-intensive programs

Which of the following technologies can encrypt files stored on a filesystem within a Linux system?

LUKS & GPG

FORWARD chain

Network packets that must pass through your computer

Common Weakness Enumeration (CWE)

OWASP categorization of the vulnerabilities identified

what is a popular vulnerability scanner in Linux systems?

OpenVAS

restorecon

Restores SE linux file context based on dir it is in

firewall-cmd --query-port=port

Returns yes if the specified port is enabled(allowed) within the current network zone, and no if it is not

firewall-cmd --query-service=service

Returns yes if the specified service is enable(allowed) within the current network zone, and no if it is not

What does SELINUX = permissive mean?

SELinux generates warnings only and logs events

What does SELINUX = disabled

SELinux is disabled

automatic bug reporting tool

Sends any application crash data to an online bug reporting site such as Bugzilla

iptables -j action

Specifies the action that is taken for a rule

iptables -A chain

Specifies the chain used

iptables -P policy

Specifies the default policy for a chain type

firewall-cmd --get-default-zone=zone

Specifies the destination port number for a rule

iptables -dport port#

Specifies the destination port number for a rule

iptables -i interface

Specifies the input network interface

iptables -o interface

Specifies the output network interface

firewall-cmd --get-default-zone

Specifies the source port number for a rule

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds

TACAS+

Terminal Access Control Access Control System Plus- same function as RADIUS

sestatus command

The command that displays the current status and functionality of the SELinux subsystem.

sar (system activity reporter) command

The command that displays various system statistics.

iptables command

The command used to configure a firewall in Fedora Linux.

vmstat command

The command used to display memory, CPU, and swap statistics.

ulimit command

The command used to modify process limit parameters in the current shell.

file handles

The connections that a program makes to files on a filesystem.

Network Latency

The delay imposed by the amount of time required for a data packet to make a round trip from point A to point B.

proactive maintenance

The measures taken to reduce future system problems.

Reactive Maintenance

The measures taken when system problems arise.

Troubleshooting procedures

The tasks performed when solving system problems.

If you change the port on a network service daemon, users must specify it when trying to connect to it. True or False?

True

SElinux is activated by default in fedora linux. True or false?

True

Multi-factor authentication

Use of several authentication techniques together, such as passwords and security tokens.

GPG agent daemon

Used to automatically supply your GPG passphrase during the remainder of the login session after it is supplied once

LInux Unified Key Setup(LUKS)

Used to encrypt entire filesystems using AES symmetric encryption

pam_tally2 command

Used to list users who have been locked out by pam_tally2.so

kinit command

Used to login into your authentication service after Kerberos is installed and have a LDAP database

pidstat (PID Statistics) command

View CPU statistics for each process

klist command

View Kerberos authentication information

how do you SAVE the chains and rules in fedora?

iptables-save > /etc/sysconfig/iptables

stateful packet filtering

it remembers traffic that was originally allowed in an existing session and adjust their rules appropriately.

dmidecode

lists BIOS information about the device

Network zone dmz

mutable-For computers publicly acccessible with restricted areas

Network zone work

mutable-for trusted work areas

What does SELINUX = enforcing mean?

policy settings are enforced by SELinux

memory leak

processes that allows them to continually use more memory until it is exhausted.

If you cannot limit access to the computers, what is a good security practice?

remove the CD and DVD drives from the computer

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?

sa19 (day of the month)

ip6tables command

same as iptables but for IPv6

sar -q

stats for the processor queue

what does the %irq and %soft indicate?

time the CPU is using to respond and interrupts

mpstat

to monitor CPU performance

Which option can be added to the ls or ps command to view the SELinux label?

-Z

OUTPUT chain

packets that originate from your computer

sar -B

swap statistics

Message Digest

unique fingerprint of file

%usr

% of time CPU has spent executing user programs and daemons

%guest

% of time CPU is executing another virtual CPU

Pluggable Authentication Modules (PAM)

A mechanism used in Linux systems to integrate low-level authentication methods into an API.

Wireshark

A popular graphical packet sniffer.

iptables -F chain

Removes all rules for the chain specified

sar -P CPU#

Specifies status for a CPU

What does SELINUXTYPE = targeted mean?

all network daemons are protected

sar -A

all options

AppArmor

alternative to SELinux

jabbering

as the hardware ages, it might start malfuncioning by sending large amounts of information to the CP when not in use

chcon

command changes the security context type of a file or process

How can you prevent public computers to be restarted using the Ctrl+Alt+Del in SysV?

comment out the ctrlaltdel action within the /etc/inittab and restart daemon

AppArmor profiles that generate warnings and log events are called _____________ mode

complain mode

how can you force SELinux to relabel all files on the system during boot up?

create a file name /.autorelabel

iptables -d address

destination address of the packet

iperf command

determine network latency between two computers

aa-disable command

disable an AppArmor profile

how does Netfilter work?

discards packets according to chains of rules

aa-unconfined command

display AppArmor profiles that are in unconfined processes

sar -b

Input/output statistics

what does the %iowait indicate?

% of time th CPU was idle when an outstanding disk I/O request existed

%idle

% of time the CPU did not spend executing tasks

%sys

% of time the system spends maintaining itself

What does SELINUXTYPE =minimum

(only critical network daemons are protected)

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

Which of the following steps is not a common troubleshooting procedure?

Delegate responsability

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure only necessary services are running

iptables -m match

Specifies a match parameter that should be used within the rule

AppArmor profile

each text file that is under /etc/apparmor.d directory

how do you enable SELinux?

edit the /etc/selinux/config file

Transport mode

encryption for IP packets destined for another computer

AppArmor profiles are enforced by are called ___________________ mode

enforced mode

how can you disable the BASH shell for Apache?

ensure that shell listed in /etc/passwd is invalid shell such as /sbin/nologin

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

multi-level security (MLS) or Multi-Category Security (MCS)

used to restrict access to files based on additional attributes provided by the organization (TS, S, confidential)

setenforce command

used to switch between enforcing mode and permissive mode

seinfo command

views the values available on your system for SELinux label sections


Ensembles d'études connexes

Chapter 12: The Lymphatic System

View Set

true or false biology sections 1-3

View Set

science test: reproductive, nervous, and endocrine system

View Set

Intro to Java Programming Chapter 1

View Set

Ch. 11 ~ Marital Residence & Kinship

View Set

Week 16: Understanding Muscle Growth

View Set