8-10 Flashcards

1
Q

BIND stands for

A

Berkley Internet Name Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default Linux ping packet size?

A

64 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: The Linux whois command will perform an information lookup on an IP or domain name.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: The HTML protocol uses the HTTP programming language across the WWW.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The _________ file stores user passwords.

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: Point to Point networks use dedicated connections and are typically costly.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Many services use the Linux _______ service (TPC 111) which allows secure client/server inter-comms.

A

RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What TCP port does ftp utilize?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A FQDN is broken up into 2 basic parts. What are they?

A

domain name
hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What two distinct parts are IP addresses are broken up into?

A

network
host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol does ping utilize?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: ftp, http, and https, are all types of internet resources accessible from a web browser.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Linux command can be used to display the local running and listening network services?

A

netstat
It is mostly used for scanning port mappings on the local machine, not services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F: The root user can use telnet to log into a remote Linux server for management purposes.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What works at OSI layer 4? (Protocol)

A

TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the Linux host and dig commands?

A

name to IP lookups
IP to name lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two methods of assigning IP addressing to client devices on a network?

A

Static
DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ______ file contains services and their common TCP and UDP ports.

A

/etc/services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What TCP port does telnet utilize?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The military _____ network was the beginning of the internet.

A

ARPANet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

There are _____ TCP ports.

A

65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What Linux service created a centralized network database of user credentials?

A

NIS
(Network Information Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Whats the default SN mask for a class C address?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What Linux command will display the known MAC address to IP address associations?

A

arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What ftp command is used to upload a file?
put
26
Which one of the below is a service designed for the transfer of files across a network?
ftp
27
A web browser and a web server are an example of a client/server environment.
True
28
What command scans a remote system for open network services?
nmap
29
URL stands for:
Uniform resource locator
30
WWW stemmed from protocols created when?
1991
31
What breaks up an IP address into two distinct parts?
Subnet mask
32
To enable a systemd service or target, the root user can use the ln command from /etc/systemd to /lib/system.
False
33
The MBR resides in the first 512 bytes of a hard disk.
True
34
What runlevel is graphical mode?
5
35
What runlevel is multi-user mode?
3 (2 through 4 actually)
36
What runlevel is reboot?
6
37
What runlevel is shutdown?
0
38
What runlevel is single user mode?
1 (duh)
39
What is a valid method to discovering a user's ID number?
the id command
40
What folder is a recue filesystem mounted to during a rescue attempt?
/mnt/sysroot
41
The su command stands for
substitute user
42
What is the r00t users ID number?
0
43
T/F: System units have wants and requirements which are really just dependencies.
True
44
The ______ command allows the root user to assign specific admin command to certain users.
sudo
45
What command can make a bit for bit copy of the HD?
dd
46
What command will display support files and drives needed by a program or command?
ldd
47
Only _____ can exit chroot.
root
48
Members of the wheel group have extended permissions beyond regular user permissions.
True
49
What systemctl option can dynamically (temporarily) change the runlevel environment?
Isolate Temporary, does not survive a reboot. systemctl **isolate** graphical.target (graphical environment) systemctl **isolate** multi-user.target (text mode)
50
What is the predecessor to systemd?
initd
51
What command diplays the HD partition table?
fdisk
52
What does the following command do? dd if=/dev/sda of=/bkup/mbr.img bs=512....
Makes a backup copy of the /dev/sda MBR *of=* is actually the destination of the backup.
53
Users can be assigned additional permissions by adding them to a secondary group.
True Located in /etc/group
54
What option with the sudo command will display a users elevated privileges?
-l sudo **-l** test.user
55
What does the below comand do? (to what environment) ln -sf ..../multi-user.target /etc/..../default.target
Sets the server to boot in text mode. If it were graphical, it would be /graphical.target instead.
56
What command can change a users account expiration?
chage
57
An _____ sets limits on what networked systems can access given network services.
ACL
58
What does the below command do? chroot /mnt/USB
Changes the root filesystem to /mnt/USB
59
What is the default setting for SELinux?
Enforcing
60
What does PAM stand for?
Pluggable Authentication Modules
61
List the order of the DHCP proccess.
Discover Offer Request Acknowledge
62
What does DIG stand for?
Domain information groper
63
Most services end in the letter:
d
64
What web service has the most market share?
NginX
65
What does VS*FTP*D stand for?
Very Secure FTP Daemon
66
What is the PID number of the systemd service?
1
67
What service (or target) is "required" to run the graphical desktop?
multi-user.target This is the value of "Requires=" displayed with the systemctl command to determine the requirements of graphical.target. Needs text before it can boot to graphical.
68
What does the "dd" command mean or stand for?
data dump
69
What Linux command sets the default permissions on any new file or directory?
umask It lists permissions that are *not* set if executed without options. Example output: 0022
70
What is the most restrictive implementation of SELinux policies?
MLS MultiLevel Security for server Requires selinux-policy-mls The other two policies are Targeted (default) and Minimum.
71
What common Linux service is typically run in a chroot environment?
named It a DNS service that prevents access outside the fake root directory.
72
What file can be used to prevent all regular users from logging into the Linux server?
/etc/nologin
73
Which one of the listed should not have a DHCP address?
routers
74
What is the name of the main DHCP servers configuration file?
dhcpd.conf (watch out for the extra d, should only have **2**!)
75
What manually installed program opens the SELinux GUI boolean?
system-config-selinux Installed from policycoreutils-gui
76
How does PAM work?
It validates that the user exists in /etc/passwd, and validates the password in /etc/shadow.
77
PAM checks authorization ______ type.
Module IT checks if files and file configs exist depending on the particular process.
78
T/F: PAM does not show a reason why authentication has failed.
True
79
What file details where root can directly login from?
/etc/securetty If the file does not exist (default), root can login from anywhere
80
What command and option will lock an account?
passwd -l [user] This will place "!!" in the shadow file.
81
The _____ group has elevated permissions when using "sudo".
wheel
82
What single user mode for?
Maintenance as the root user.
83
T/F: **Always** use "-" and **never** su more than one user.
True
84
What file contains users and what commands they are allowed to execute with root permissions?
/etc/sudoers
85
When creating sudo commands for users, should you use the full or relative path?
Always full path Syntax: user host_computer=(run as) command(s) with full path "run as" assumes the root user if not present.
86
What is the ".target" systemd unit type?
A multitude of services grouped together as one.
87
What are the two most important folders related to systemd and services?
/etc/systemd/system /usr/lib/systemd/system /etc/systemd/system contains links to services in /usr/lib/systemd/system. If the links in /etc/... are aqua, they will start at boot. "systemctl enable [service]" will create the link automatically. The other option is "ln- sf" (symbolic & soft).
88
Not only does /usr/lib/systemd/system contain links originating from /ect/systemd, it also contains files from _____ installed programs.
manually Ex: dnf, rpm
89
What option, when run with the systemctl command, will display loaded services, both failed and active?
- -all systemctl - -all
90
After a "systemctl start", you should always do a systemctl _____.
status
91
What does pgrep do?
Displays processes owned by the user (pgrep -u [user]).
92
What command will format partitions?
mkfs stands for "make filesystem"