Day 6: Linux Security Essentials Flashcards
(T/F) Windows is loaded on over 80% of all computers.
True
(T/F) Windows is the OS that most mission-critical systems run on.
False
(T/F) Most security appliances that are installed in a data center are running Linux
True
What is the difference between a major breach and a minor breach?
It is not the system that is compromised, but the data it contains.
What OS do most appliances and security devices run?
Linux
(T/F) It is important to remember that although Windows has a much larger install base, Linux is usually installed on most important, mission critical systems.
True
What OS do security analysts, assessment and penetration testers and many security teams using?
Linux
(T/F) Linux started as a desktop OS, but has moved into the data center as a server.
False
What are the main linux distributions?
- Ubuntu (Debian)
- Fedora (Red Hat)
- Cygwin for Windows
- Mac OS (BSD)
What distribution is Kali based on?
Debian
Often just called Linux, what is the proper nominclature?
GNU/Linux
Who ported Minix (a UNIX teaching tool) to Linux from scratch for the Intel 386 platform?
Linus Torvalds
What does Ubuntu mean when translated back to it’s African word?
Humanity to others
Ubuntu is based on what branch of Linux?
Debian
What linux branch is best known for its package management system?
Debian
What is the Debian package-management system called?
APT: Advanced Package Tool
How does APT work?
APT researches the package in question, sees what libraries and other programs that the package might need (these are called dependencies), goes out to the Internet and downloads them, installs them, presents any configuration choices to the user, and Chen checks it work - all done automatically.
Does Ubuntu come with a default firewall and a graphical control for the firewall ENABLED?
no
What Linux is Fedora based on?
RedHat
With Fedora, is the firewall included and enabled?
Yes
What is the most profitable Linux version?
RedHat
With any OS is it critical to continually think about security and look at additional hardening measures?
Yes
What are the major steps to securing Mac OS?
- Turn on firewall to control access to the system.
- Turn off unneeded services
- Limit service sharing
- Set up securing file sharing
- Carefully monitor access lists
- Use password assistant for stronger authentication
What is the Linux command to list contents of a directory?
ls
What is the Linux command to list contents of a directory including long listing and shows attributes?
ls -l
What is the Linux command to list contents of a directory including both hidden and regular files?
ls -al
What is the Linux command to change the working directory?
cd
What is the Linux command to rename a file?
mv
What is the Linux command to change file attributes?
chmod
What is the Linux command to make a new directory?
mkdir
What is the Linux command to remove a directory?
rmdir
What is the Linux command to delete files?
rm
What is the Linux command to copy files?
cp
What is the DOS command to list contents of a directory?
dir /w
What is the DOS command to list contents of a directory including both hidden and regular files?
dir
What is the DOS command to list contents of a directory including both hidden and regular files?
dir /a
What is the DOS command to change the working directory?
cd
What is the DOS command to rename a file?
rename