09 Security Fundamentals Flashcards

1
Q

T/F The user’s password is stored in /etc/passwd

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which file is the primary group for a user stored?

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the default intrusion detection package called?

A

AIDE Advanced Intrusion Detection Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do the file’s permissions or modes represented by three octal digits 755 mean?

A

Readable, writable and executable by the file’s owner. Readable and executable by the group and all others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

if you need to make it so the account bob can use sudo, what file must you access?

A

/etc/sudoers.d/bob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what command is used to list and modify password aging values

A

chage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is OpenSSl

A

A software library that provides encryption for applications in order to secure network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network firewall

A

An entity that checks packet headers against a set of rules configured by the administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would the content of the file for user student in the sudoers directory look like? Given all sudo permissions.

A

student ALL=(ALL:ALL) ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many fields does an entry for a user in the /etc/passwd file have? And what are they?

A

7: username, password (an x, the pw is in shadow), user ID, Group ID, comment, home directory, default shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how many fields are there for each entry in the /etc/shadow file and what are they?

A

9: username, encrypted password, last changed, min/max password age, password warning period, password inactivity period, account expiration date, and one reserved field for potential future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the 7 types of files that can be represented in the metadata?

A

”-“ regular file
“d” directory entry
“l” soft link
“c” character device
“b” block device
“p” named pipe
“s” socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an ACL

A

Access Control List, list of permissions associated with the file. Allows more than one user or group per file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SELinux?

A

Security Enhanced Linux, finer grained access control. If something is not explicitly allowed the action is denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is AppArmor?

A

Linux kernel security module that lets sysadmins control a program’s capabilities and use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is GPG?

A

GNU Privacy Guard. Create keys, prepare keys for exchange with others, and manage keys.

17
Q

What utility is often used to encrypt filesystems?

A

cryptsetup, often used on partitions

18
Q

What are some applications that utilize OpenSSL?

A

https, ssh, OpenSSH, and postfix

19
Q

What is the linux firewall and what are it’s two most common types?

A

Netfilter, two types are iptables and nftables. iptables is the older more simpler one, nftables is more advanced and flexible

20
Q

in packet filtering, what does a INVALID state mean?

A

packet is associated with no known connection

21
Q

in packet filtering, what does an ESTABLISHED state mean?

A

packet is associated with a connection that has seen packets in both directions

22
Q

in packet filtering, what does a NEW state mean?

A

packet has started a new connection

23
Q

in packet filtering, what does a RELATED state mean?

A

packet is starting a new connection but is associated with an existing connection

24
Q

when packet filtering, what are some of the details given by a packet’s context

A

IP address and port destination
IP address and port source
Timer for idle connections
Packet length
TCP sequence
Packet fragmentation

25
Q

Name the 5 IDS described by this course, besides AIDE

A

SELinux
Open Source Tripwire
Fail2ban
OSSEC
Snort