110 Security KA Flashcards

1
Q

110.1 Perform security administration tasks

A

Key Knowledge Areas:

Audit a system to find files with the suid/sgid bit set.
Set or change user passwords and password aging information.
Being able to use nmap and netstat to discover open ports on a system.
Set up limits on user logins, processes and memory usage.
Determine which users have logged in to the system or are currently logged in.
Basic sudo configuration and usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit a system to find files with the suid/sgid bit set.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Set or change user passwords and password aging information.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Being able to use nmap and netstat to discover open ports on a system.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Set up limits on user logins, processes and memory usage.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Determine which users have logged in to the system or are currently logged in.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic sudo configuration and usage.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

110.2 Setup host security

A

Key Knowledge Areas:

Awareness of shadow passwords and how they work.
Turn off network services not in use.
Understand the role of TCP wrappers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Awareness of shadow passwords and how they work.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Turn off network services not in use.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Understand the role of TCP wrappers.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

110.3 Securing data with encryption

A

Key Knowledge Areas:

Perform basic OpenSSH 2 client configuration and usage.
Understand the role of OpenSSH 2 server host keys.
Perform basic GnuPG configuration, usage and revocation.
Use GPG to encrypt, decrypt, sign and verify files.
Understand SSH port tunnels (including X11 tunnels).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Perform basic OpenSSH 2 client configuration and usage.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Understand the role of OpenSSH 2 server host keys.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Perform basic GnuPG configuration, usage and revocation.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use GPG to encrypt, decrypt, sign and verify files.

A

a

17
Q

Understand SSH port tunnels (including X11 tunnels).

A

a