Chapter_3_Linux Operating System

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The image displays a laptop that is acting as the SSH client that is communicating with an SSH server. Refer to the exhibit. Which well-known port number is used by the server? > 23 > 22 > 21 > 25

> 22 * SSH

What is the well-known port address number used by DNS to serve requests? > 60 > 110 > 25 > 53

> 53 *

Which working environment is more user-friendly? > A CLI > A GUI > The command prompt > A hybrid GUI and CLI interface

> A GUI * (A graphical user interface (GUI) is considered to be more user-friendly because it presents the operating system with an interface and icons that make it easy to locate applications and complete tasks.)

Which file system is the primary file system used by Apple in current Macintosh computers? > CDFS > APFS > ext3 > ext2 > HFS+

> APFS *

Which types of files are used to manage services in a Linux system? > Device files > System files > Directory files > Configuration files

> Configuration files * (In Linux, services are managed using configuration files. When the service starts, it looks for its configuration files, loads them into memory, and adjusts itself according to the settings in the files.)

Which two methods can be used to harden a computing device? (Choose two.) > Allow default services to remain enabled. > Update patches on a strict annual basis irrespective of release date. > Enforce the password history mechanism. > Ensure physical security. > Allow USB auto-detection.

> Enforce the password history mechanism. * > Ensure physical security. *

Which method can be used to harden a computing device? > Allow USB auto-detection. > Force periodic password changes. > Allow default services to remain enabled. > Update patches on a strict annual basis irrespective of release date

> Force periodic password changes. *

What is the purpose of a Linux package manager? > It provides access to settings and the shutdown function. > It is used to compile code that creates an application. > It is used to install an application. > It provides a short list of tasks a particular application can perform.

> It is used to install an application. * (A package is a specific program and all of the files needed to run that application. A package manager is used to install a package and place all the associated files in the correct location within the operating system.)

What is a benefit of Linux being an open source operating system? > Linux distributions are maintained by a single organization. > Linux distributions must include free support without cost. > Linux distribution source code can be modified and then recompiled. > Linux distributions are simpler operating systems since they are not designed to be connected to a network.

> Linux distribution source code can be modified and then recompiled. * (Linux is an open source operating system and any person can access the source code, inspect it, modify it, and recompile it.)

Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities? > Firewall > PenTesting > Malware analysis > Intrusion detection system

> PenTesting * (PenTesting is known as penetration testing and includes tools that are used to search for vulnerabilities in a network or computer by attacking it.)

Which term is used to describe a running instance of a computer program? > Fork > Patch > Process > Package manager

> Process * (A process is a running instance of a computer program. Multitasking operating systems can execute multiple processes at the same time. A processID (PID) is used to identify a process. The ps or top command can be used to see what processes are currently running on a computer.)

Which Linux component would be used to access a short list of tasks the application can perform? > Launcher > Quicklist > Dash Search Box > System and Notification Menu

> Quicklist * (The Quicklist is accessed by right-clicking any application hosted on the Launcher. Quicklist allows access to a few tasks for the specific application.)

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file? Click here to view code image ls -l analyst.txt -rwxrw-r- sales staff 1028 May 28 15:50 analyst.txt > Read only > Read, write > Full access > Read, write, execute

> Read, write *

Why would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)? > It is easier to use than other operating systems. > It is more secure than other server operating systems. > The administrator has more control over the operating system. > More network applications are created for this environment

> The administrator has more control over the operating system. * (There are several reasons why Linux is a good choice for the SOC.Linux is open source. The command line interface is a very powerful environment. The user has more control over the operating system. Linux allows for better network communication control.)

What is the outcome when a Linux administrator enters the man man command? > The man man command configures the network interface with a manual address. > The man man command provides documentation about the man command. > The man man command provides a list of commands available at the current prompt. > The man man command opens the most recent log file.

> The man man command provides documentation about the man command. * (The man command is short for manual and is used to obtain documentation about a Linux command. The command man man would provide documentation about how to use the manual.)

How is a server different from a workstation computer? > The server works as a standalone computer. > The server is designed to provide services to clients. > The workstation has fewer applications installed. > The workstation has more users who attach to it.

> The server is designed to provide services to clients. *

Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss? > ext2 > ext3 > NFS > CDFS

> ext3 * (The ext3 file system is considered a journaled file system that was designed to improve the existing ext2 file system. A journal, the main feature added to ext3, is a technique used to minimize the risk of file system corruption in the event of sudden power loss.)

Why is Linux considered to be better protected against malware than other operating systems? > fewer deployments > integrated firewall > customizable penetration and protection tools > file system structure, file permissions, and user account restrictions

> file system structure, file permissions, and user account restrictions * (The Linux operating design including how the file system is structured, standard file permissions, and user account restrictions make Linux a better protected operating system.)

What is the method employed by a Linux kernel to create new processes for multitasking of a process? > creating interdependent processes > dynamic processes > pipelining > forking

> forking * (Multitasking operating systems are required to execute several processes at the same time. Forking is a method that the kernel uses to allow a process to create a copy of itself.)

Which Linux command is used to manage processes? > kill > grep > chrootkit > ls

> kill * (The kill command is used to stop, restart, or pause a process. The chrootkit command is used to check the computer for rootkits, a set of software tools that can increase the privilege level of a user or grant access to portions of software normally not allowed. The grep command is used to look for a file or text within a file. The ls command is used to list files, directories, and file information.)

Which type of tool allows administrators to observe and understand every detail of a network transaction? > malware analysis tool > packet capture software > ticketing system > log manager

> packet capture software *

What term is used for operating system updates? > patches > new releases > penetration testing > packages

> patches *

Which Linux command can be used to display the name of the current working directory? > chmod > pwd > ps > sudo

> pwd * (One of the most important commands in Linux is the pwd command, which stands for print working directory. It shows users the physical path for the directory they are working in.(

Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file? ls -l analyst.txt -rwxrw-r- sales staff 1028 May 28 15:50 analyst.txt > write only > read, write, execute > read, write > read only

> read, write, execute *

Which user can override file permissions on a Linux computer? > only the creator of the file > any user that has 'group' permission to the file > any user that has 'other' permission to the file > root user

> root user *

What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed? > penetration testing > package manager > rootkit > compiler

> rootkit * (A rootkit is used by an attacker to secure a backdoor to a compromised computer, grant access to portions of the operating system normally not permitted, or increase the privileges of a user.)

Which command can be utilized to view log entries of NGINX system events in real time? > sudo journalctl -u nginx.service -f > sudo journalctl -f > sudo journalctl -until "1 hour ago" > sudo journalctl -u nginx.services

> sudo journalctl -u nginx.service -f (The journalctl command supports mixing options to achieve a desired filter set. The -u option allows filtering on the desired unit, whereas the -f option follows the specific log, thus monitoring the event in real time.)

A Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment? > file viewer > package management tool > terminal emulator > system viewer

> terminal emulator *

What is the main purpose of the X Window System? > to provide a customizable CLI environment > to provide a basic framework for a GUI > to provide remote access to a Linux-based system > to provide a basic set of penetration testing tools

> to provide a basic framework for a GUI *

What is a purpose of apt-get commands? > to configure an appointment for a specific date and time > to configure and manage task (to-do) lists > to update the operating system > to apportion and configure a part of the hard disk for file storage

> to update the operating system * (The Advanced Packaging Tool (apt) package manager is used to update the operating system. The apt-get update command is used to search and obtain the package list from a repository and update the local package database.)

Which two Linux commands might be used before using the kill command? (Choose two.) > top > ls > grep > ps > chroot

> top * > ps * (The ps or top command might be used before using the kill command to discover the process ID (PID) for the specific process.)


Set pelajaran terkait

CNO Practice Standard: Confidentiality and Privacy

View Set

Teaching and Learning/Patient Education

View Set

Ethos/Pathos/Logos in Patrick Henry's Speech to the Virginia Convention

View Set

Writing and Graphing Equations in Two Variables

View Set

NCLEX Alzheimer's, Dementia, and Delirium

View Set