8-10 Flashcards

1
Q

BIND stands for

A

Berkley Internet Name Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default Linux ping packet size?

A

64 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: The Linux whois command will perform an information lookup on an IP or domain name.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: The HTML protocol uses the HTTP programming language across the WWW.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The _________ file stores user passwords.

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: Point to Point networks use dedicated connections and are typically costly.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Many services use the Linux _______ service (TPC 111) which allows secure client/server inter-comms.

A

RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What TCP port does ftp utilize?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A FQDN is broken up into 2 basic parts. What are they?

A

domain name
hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What two distinct parts are IP addresses are broken up into?

A

network
host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol does ping utilize?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: ftp, http, and https, are all types of internet resources accessible from a web browser.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Linux command can be used to display the local running and listening network services?

A

netstat
It is mostly used for scanning port mappings on the local machine, not services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F: The root user can use telnet to log into a remote Linux server for management purposes.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What works at OSI layer 4? (Protocol)

A

TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the Linux host and dig commands?

A

name to IP lookups
IP to name lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two methods of assigning IP addressing to client devices on a network?

A

Static
DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ______ file contains services and their common TCP and UDP ports.

A

/etc/services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What TCP port does telnet utilize?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The military _____ network was the beginning of the internet.

A

ARPANet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

There are _____ TCP ports.

A

65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What Linux service created a centralized network database of user credentials?

A

NIS
(Network Information Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Whats the default SN mask for a class C address?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What Linux command will display the known MAC address to IP address associations?

A

arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What ftp command is used to upload a file?

A

put

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which one of the below is a service designed for the transfer of files across a network?

A

ftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A web browser and a web server are an example of a client/server environment.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What command scans a remote system for open network services?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

URL stands for:

A

Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

WWW stemmed from protocols created when?

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What breaks up an IP address into two distinct parts?

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To enable a systemd service or target, the root user can use the ln command from /etc/systemd to /lib/system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The MBR resides in the first 512 bytes of a hard disk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What runlevel is graphical mode?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What runlevel is multi-user mode?

A

3 (2 through 4 actually)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What runlevel is reboot?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What runlevel is shutdown?

A

0

38
Q

What runlevel is single user mode?

A

1 (duh)

39
Q

What is a valid method to discovering a user’s ID number?

A

the id command

40
Q

What folder is a recue filesystem mounted to during a rescue attempt?

A

/mnt/sysroot

41
Q

The su command stands for

A

substitute user

42
Q

What is the r00t users ID number?

A

0

43
Q

T/F: System units have wants and requirements which are really just dependencies.

A

True

44
Q

The ______ command allows the root user to assign specific admin command to certain users.

A

sudo

45
Q

What command can make a bit for bit copy of the HD?

A

dd

46
Q

What command will display support files and drives needed by a program or command?

A

ldd

47
Q

Only _____ can exit chroot.

A

root

48
Q

Members of the wheel group have extended permissions beyond regular user permissions.

A

True

49
Q

What systemctl option can dynamically (temporarily) change the runlevel environment?

A

Isolate

Temporary, does not survive a reboot.
systemctl isolate graphical.target
(graphical environment)

systemctl isolate multi-user.target
(text mode)

50
Q

What is the predecessor to systemd?

A

initd

51
Q

What command diplays the HD partition table?

A

fdisk

52
Q

What does the following command do?
dd if=/dev/sda of=/bkup/mbr.img bs=512….

A

Makes a backup copy of the /dev/sda MBR
of= is actually the destination of the backup.

53
Q

Users can be assigned additional permissions by adding them to a secondary group.

A

True
Located in /etc/group

54
Q

What option with the sudo command will display a users elevated privileges?

A

-l

sudo -l test.user

55
Q

What does the below comand do? (to what environment)
ln -sf …./multi-user.target /etc/…./default.target

A

Sets the server to boot in text mode. If it were graphical, it would be /graphical.target instead.

56
Q

What command can change a users account expiration?

A

chage

57
Q

An _____ sets limits on what networked systems can access given network services.

A

ACL

58
Q

What does the below command do?
chroot /mnt/USB

A

Changes the root filesystem to /mnt/USB

59
Q

What is the default setting for SELinux?

A

Enforcing

60
Q

What does PAM stand for?

A

Pluggable Authentication Modules

61
Q

List the order of the DHCP proccess.

A

Discover
Offer
Request
Acknowledge

62
Q

What does DIG stand for?

A

Domain information groper

63
Q

Most services end in the letter:

A

d

64
Q

What web service has the most market share?

A

NginX

65
Q

What does VSFTPD stand for?

A

Very Secure FTP Daemon

66
Q

What is the PID number of the systemd service?

A

1

67
Q

What service (or target) is “required” to run the graphical desktop?

A

multi-user.target
This is the value of “Requires=” displayed with the systemctl command to determine the requirements of graphical.target.
Needs text before it can boot to graphical.

68
Q

What does the “dd” command mean or stand for?

A

data dump

69
Q

What Linux command sets the default permissions on any new file or directory?

A

umask
It lists permissions that are not set if executed without options.
Example output:
0022

70
Q

What is the most restrictive implementation of SELinux policies?

A

MLS
MultiLevel Security for server
Requires selinux-policy-mls

The other two policies are Targeted (default) and Minimum.

71
Q

What common Linux service is typically run in a chroot environment?

A

named
It a DNS service that prevents access outside the fake root directory.

72
Q

What file can be used to prevent all regular users from logging into the Linux server?

A

/etc/nologin

73
Q

Which one of the listed should not have a DHCP address?

A

routers

74
Q

What is the name of the main DHCP servers configuration file?

A

dhcpd.conf (watch out for the extra d, should only have 2!)

75
Q

What manually installed program opens the SELinux GUI boolean?

A

system-config-selinux
Installed from policycoreutils-gui

76
Q

How does PAM work?

A

It validates that the user exists in /etc/passwd, and validates the password in /etc/shadow.

77
Q

PAM checks authorization ______ type.

A

Module
IT checks if files and file configs exist depending on the particular process.

78
Q

T/F: PAM does not show a reason why authentication has failed.

A

True

79
Q

What file details where root can directly login from?

A

/etc/securetty
If the file does not exist (default), root can login from anywhere

80
Q

What command and option will lock an account?

A

passwd -l [user]
This will place “!!” in the shadow file.

81
Q

The _____ group has elevated permissions when using “sudo”.

A

wheel

82
Q

What single user mode for?

A

Maintenance as the root user.

83
Q

T/F: Always use “-“ and never su more than one user.

A

True

84
Q

What file contains users and what commands they are allowed to execute with root permissions?

A

/etc/sudoers

85
Q

When creating sudo commands for users, should you use the full or relative path?

A

Always full path
Syntax:
user host_computer=(run as) command(s) with full path
“run as” assumes the root user if not present.

86
Q

What is the “.target” systemd unit type?

A

A multitude of services grouped together as one.

87
Q

What are the two most important folders related to systemd and services?

A

/etc/systemd/system
/usr/lib/systemd/system

/etc/systemd/system contains links to services in /usr/lib/systemd/system. If the links in /etc/… are aqua, they will start at boot.

“systemctl enable [service]” will create the link automatically. The other option is “ln- sf” (symbolic & soft).

88
Q

Not only does /usr/lib/systemd/system contain links originating from /ect/systemd, it also contains files from _____ installed programs.

A

manually
Ex: dnf, rpm

89
Q

What option, when run with the systemctl command, will display loaded services, both failed and active?

A
  • -all
    systemctl - -all
90
Q

After a “systemctl start”, you should always do a systemctl _____.

A

status

91
Q

What does pgrep do?

A

Displays processes owned by the user (pgrep -u [user]).

92
Q

What command will format partitions?

A

mkfs
stands for “make filesystem”