CSCI 4612 Final (Outsourced)
What is Snort?
An intrusion detection service
The Linux open source license, referred to as GNU General Public License (GPL), requires which of the following?
Any software based on GPLed software retains the same rights as the original software
Keeping secrets is the essence of which tenet of the C-I-A triad?
Confidentiality
What is the CUPS service associated with?
Printing
The cron and at services enable you to schedule tasks in Linux. True or False?
True
Wireless encryption algorithms such as WPA and WPA2 may be cracked if they use weak pre-shared keys based on dictionary words. True or False?
True
Which mounting option enables user quotas on a filesytem? 1) usrquota 2) enable quotas 3) edquota 4) rw
usrquota
What is Apache?
A Web server
If the kernel file is overwritten with a binary that doesn't work or if the file is erased, the system won't boot again until the kernel file is replaced. True or False?
True
The iptables -j DROP and -j REJECT command options both drop packets. True or False?
True
Which of the following is associated with wireless intrusion detection system (WIDS)?
Wi-Fi Protected Access (WPA)
Regarding SELinux, which of the following files includes lists of critical files and services to be watched for changes?
sestatus.conf
Which of the following is usually about preventing a party involved in a transaction from denying that the transaction occurred?
Nonrepudiation
Which file is used to configure the various mounting options of a filesystem upon boot?
/etc/fstab
Configuring a user account policy with minimum password length, maximum days for using a password, and various user logins can be performed by editing the ________ file.
/etc/login.defs
From which of the following files does the iptables command read ports of well-known services?
/etc/services
Which of the following files is NOT a part of the shadow password suite? 1) /etc/shadow 2) /etc/group 3) /etc/passwd 4) /etc/sudoers
/etc/sudoers
Which file permission is NOT an example of discretionary access control? 1) Read 2) Write 3) Execute 4) Boolean
Boolean
A user needs access to execute networking-related commands only. What type of access should be granted using the principle of least privilege?
The user should be given sudo access to NETWORKING.
Alternate attack vectors include connections through telephone modems and serial ports. True or False?
True
Cron is a service for running administrative jobs on a regular basis. True or False?
True
Files on a device are accessible only when they're mounted on a Linux directory. True or False?
True
Pluggable authentication modules (PAM) offers a number of ways for users to be authenticated on a Linux system. True or False?
True
When configuring obscure ports for a service, configuring different ports for clients and servers is not enough. You also need to configure an open port in the firewall. True or False?
True
The _________ part of the kernel contains drivers and options essential to the kernel boot process.
monolithic
What is the best definition of a firewall?
Hardware or software capable of blocking networking communications based on established criteria, or rules
Assuming a demilitarized zone (DMZ) is configured, there's no need to set up a separate firewall between the DMZ network and the internal network. True or False?
False
The identifiers ext4, FAT32, and NTFS are types of kernels. True or False?
False
You used a protocol analyzer to capture some network traffic. You want to focus on FTP traffic. What port should be used?
21
Whereas the cron service is a scheduler for jobs to be run on a one-time basis, the at service is a scheduler for jobs to be run on a regular basis. True or False?
False
The iptables -s <ip_address> rule is applied to packets that come from the noteddestination address. True or False?
False
The ls -p command displays file and folder permissions. True or False?
False
Which of the following is the development distribution for Red Hat? Fedora, Ubuntu, Mint, Debian
Fedora
The following are true of system hardening EXCEPT: 1) A hardened system is more resistant to attack. 2) It involves removing all but the most critical users from the system. 3) A hardened system usually has more packages to update than an unhardened system. 4) It involves ensuring permissions are restricted on files and directories.
It involves removing all but the most critical users from the system.
What does Red Hat Enterprise Linux use to install software packages?
Red Hat Package Manager (RPM) and Yellowdog Update, Modified (yum)
Which of the following enables a Linux system to be used as a Windows domain controller to authenticate Windows users? 1) Samba 2) A modular kernel 3) GRUB 4) LILO
Samba
Which of the following represents a type of mandatory access control? 1) A user cannot open the /etc/shadow file to read because the file is owned by user and group root. 2) The FTP service is allowed to interact with directories other than users' home directories. 3) A user gives a group permission to read the /var/log file. 4) A user can give read, write, and execute permissions to a file.
The FTP service is allowed to interact with directories other than users' home directories.
A rainbow table is a set of precomputed stored hashes that are mapped to a plaintext password. True or False?
True
In Linux, three major services that network files and folders are the Network File System (NFS), Samba, and the File Transfer Protocol (FTP). True or False?
True
The iptables -R command replaces a rule in a chain of rules. True or False?
True
The most common standard for file encryption on Linux is based on GNU Privacy Guard (GPG). True or False?
True
You can use specific iptables rules to prevent denial of service (DoS) attacks. True or False?
True
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated with password databases.
pluggable authentication modules (PAM)
A discretionary access control for a file is a control mechanism that is set by _______.
the user owner of the file
Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext. True or False?
true