Exam 1 Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A blacklist is a list of things you want to allow, such as IP addresses or systems.

false

A hypervisor is a software interface designed specifically for virtual machines with limited resources.

false

A rainbow table is a set of precomputed stored hashes that are mapped to a plaintext password.

false

GNU's Not Unix (GNU) refers to commercial versions of Linux software.

false

Infrastructure as a Service (IaaS) provides a complete Web application solution for easier application development.

false

LILO is the default boot loader for Ubuntu, Red Hat, and many other Linux distributions.

false

Service startup scripts have names that begin with an S followed by a two-digit number, which specifies the order in which the service will start up.

false

The process of fixing commercial software is typically less constrained by human resource issues than open source software projects.

false

Pluggable authentication modules (PAM) solves administrative permission problems by providing higher-level functions without having the whole program gain administrative access

false ?

In the password shadow suite, the difference between /etc/shadow and /etc/gshadow is that with /etc/gshadow, passwords are rarely configured.

true

Linux can operate as a hypervisor in and of itself, so it can also run as a guest operating system inside any other hypervisor.

true

Mint is a derivative of the Debian distribution.

true

Most Linux distributions have pre-compiled packages, which determine all the dependencies.

true

SELinux and AppArmor provide mandatory access controls

true

Source-based distributions of Linux enable you to decide how many packages you want to include in it.

true

The Linux open source license allows anyone to use, modify, and improve the source code.

true

The init and systemd programs start up Linux services

true

An administrator typically stops and starts services using the init program.

false

A hardened Linux system typically contains fewer packages to be monitored for updates in case vulnerabilities are found in the software.

true

A server distribution's kernel may be tuned differently than a desktop distribution.

true

A threat vector describes a way for an attacker to get into a system

true

All packages in a source-based distribution of Linux must be compiled from source.

true

In Linux, every user and group has a user ID (UID) and group ID (GID) number

true

In a Linux system, a smaller number of packages means a smaller surface area for attack.

true

The init process is the super process that is responsible for starting all processes other than those specified by the runlevel during system startup.

true

The primary boot loaders in Linux are Grand Unified Bootloader (GRUB) and Linux Loader (LILO).

true

The term "attack surface" indicates the total number of vulnerabilities a system might have

true

The term "copyleft" is associated with the GNU General Public License (GPL).

true

Using nonstandard Transmission Control Protocol/Internet Protocol (TCP/IP) suite port numbers for key services can slow the efforts of attackers who want to break into a system

true

You can set the runlevel by using the init command and passing the runlevel to it.

true


Set pelajaran terkait

Honors Physics Two Dimensional Kinematics Test

View Set

PTA 130 Test Two All of the notes for upper limb and lower limb

View Set

Additive Inverse and Identity, Multiplicative Inverse, Identity, and property of zero

View Set

Digital Technology Week 2 - Digital Business

View Set

MKT Information and Analysis - QUIZ 1

View Set