Day 6: Linux Security Essentials Flashcards

1
Q

(T/F) Windows is loaded on over 80% of all computers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(T/F) Windows is the OS that most mission-critical systems run on.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(T/F) Most security appliances that are installed in a data center are running Linux

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a major breach and a minor breach?

A

It is not the system that is compromised, but the data it contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What OS do most appliances and security devices run?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(T/F) It is important to remember that although Windows has a much larger install base, Linux is usually installed on most important, mission critical systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What OS do security analysts, assessment and penetration testers and many security teams using?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(T/F) Linux started as a desktop OS, but has moved into the data center as a server.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main linux distributions?

A
  • Ubuntu (Debian)
  • Fedora (Red Hat)
  • Cygwin for Windows
  • Mac OS (BSD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What distribution is Kali based on?

A

Debian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Often just called Linux, what is the proper nominclature?

A

GNU/Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who ported Minix (a UNIX teaching tool) to Linux from scratch for the Intel 386 platform?

A

Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Ubuntu mean when translated back to it’s African word?

A

Humanity to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ubuntu is based on what branch of Linux?

A

Debian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What linux branch is best known for its package management system?

A

Debian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Debian package-management system called?

A

APT: Advanced Package Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does APT work?

A

APT researches the package in question, sees what libraries and other programs that the package might need (these are called dependencies), goes out to the Internet and downloads them, installs them, presents any configuration choices to the user, and Chen checks it work - all done automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Does Ubuntu come with a default firewall and a graphical control for the firewall ENABLED?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What Linux is Fedora based on?

A

RedHat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

With Fedora, is the firewall included and enabled?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the most profitable Linux version?

A

RedHat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With any OS is it critical to continually think about security and look at additional hardening measures?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the major steps to securing Mac OS?

A
  1. Turn on firewall to control access to the system.
  2. Turn off unneeded services
  3. Limit service sharing
  4. Set up securing file sharing
  5. Carefully monitor access lists
  6. Use password assistant for stronger authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Linux command to list contents of a directory?

A

ls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the Linux command to list contents of a directory including long listing and shows attributes?

A

ls -l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the Linux command to list contents of a directory including both hidden and regular files?

A

ls -al

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the Linux command to change the working directory?

A

cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the Linux command to rename a file?

A

mv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the Linux command to change file attributes?

A

chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the Linux command to make a new directory?

A

mkdir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the Linux command to remove a directory?

A

rmdir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the Linux command to delete files?

A

rm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the Linux command to copy files?

A

cp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the DOS command to list contents of a directory?

A

dir /w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the DOS command to list contents of a directory including both hidden and regular files?

A

dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the DOS command to list contents of a directory including both hidden and regular files?

A

dir /a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the DOS command to change the working directory?

A

cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the DOS command to rename a file?

A

rename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the DOS command to change file attributes?

A

attrib

40
Q

What is the DOS command to make a new directory?

A

md

41
Q

What is the DOS command to remove a directory?

A

rd

42
Q

What is the DOS command to delete files?

A

del

43
Q

What is the DOS command to copy files?

A

copy

44
Q

What is the Linux command to view file contents?

A

cat

45
Q

What is the Linux command to print the current working directory?

A

pwd

46
Q

What is the Linux command to view a page at a time

A

more

47
Q

What is the Linux command to read the help manual?

A

man

48
Q

What is the Linux command to find specific files?

A

find

49
Q

What is the Linux command to perform string searches?

A

grep

50
Q

What is the Linux command to switch user accounts?

A

su

51
Q

What is the Linux command to delegate authority to users?

A

sudo

52
Q

What is the Linux character to pipe one command into another one?

A

|

53
Q

How do you create a file as output from commands?

A

>

54
Q

What is the Linux command-line interpreter used to run programs on the computer?

A

shell

55
Q

In Linux, what provides the use with an interface to the system?

A

shell

56
Q

In linux, what listens to the terminal and translates requests into action by the kernel and programs?

A

shell

57
Q

In Linux, what is the vehicle through which applications obtain permissions and interact with the kernel?

A

shell

58
Q

In Linux, what is the root file system?

A

/

59
Q

In Linux, what is the top of the directory hierarchy?

A

/

60
Q

What can you use to find the commands for each different Linux distributions?

A

Unix Rosetta Stone

61
Q

In Linux, what directory contains files used to talk to system devices?

A

/dev

/devices

62
Q

In Linux, what directory contains the primary OS?

A

/usr

63
Q

How should you setup the /usr directory for security?

A

Mount it read-only

64
Q

In Linux, what directory contains logs, queues, etc.?

A

/var

65
Q

In Linux, what directories contain executable programs, some of which are SUID or SGID?

A

/bin
/usr/bin
/usr/local
/opt

66
Q

In Linux, what directories contain user home directories?

A

/home

/export/home

67
Q

(T/F) There used to be a lot of variance about where different files were located in different Linux flavors, but modern Linux variants use the same general file system layout.

A

True

68
Q

In Linux, what is the top of the file system?

A

/

69
Q

In Linux, what directory contains the special device files that programs running on the system use to communicate with the physical hardware devices controlled by the kernel?

A

/dev

70
Q

In Linux, where are the most critical components of the OS found - including system binaries, programming library and tools?

A

/usr

71
Q

In Linux, what directory has the online documentation?

A

/usr

72
Q

In Linux, what directory should be thought of as read-only after the OS is loaded until the system is upgraded or patched?

A

/usr

73
Q

In Linux, what directory is the place where the system keeps frequently changing data, such as logs and temporary queues?

A

/var

74
Q

In Linux, the standard convention is to put 3rd party software obtained from the Internet into what directory?

A

/usr/local

75
Q

SYSV-derived systems such as Solaris and HP-UX often put 3rd-party software into which directory?

A

/opt

76
Q

What are the Linux File System Security Goals?

A
  1. Protect OS binaries in /usr
  2. Prevent introduction of SUID programs and unauthorized devices
  3. Allow other software to be installed
  4. Discourage DoS attacks
77
Q

After a system is compromised, the attacker likely wants to install a rootkit. Typically, the binaries that the attacker replaces are OS programs in which directory?

A

/usr/bin

/usr/sbin

78
Q

What is called a set of binaries that gives an attacker a back door into the system and helps them escape detection by the system administrator?

A

Rootkit

79
Q

(T/F) The administrator should not attempt to stop people from creating or bringing unauthorized set-UID and set-GID programs on the machine.

A

Falst

80
Q

Administrators partition file systems to prevent what types of attacks?

A

Denial of Service (DoS)

81
Q

What is the golden rule?

A

The best way to secure a service is to turn it off, and if it’s not needed, uninstall it.

82
Q

The phase “The best way to secure a service is to turn it off, and if it’s not needed, uninstall it” is known as?

A

The golden rule

83
Q

(T/F) Although many security mechanisms are built into Linux, there is no such thing as a secure Linux install.

A

True

84
Q

Linux Classic init is also known as what style initialization?

A

System-V

85
Q

In Linux, what is the original boot time service starter?

A

init

86
Q

(T/F) In Linux, init does not follow a linear process.

A

false

87
Q

(T/F) In Linux, init is able to detect and handle sudden changes in the system.

A

False

88
Q

In Linux, when does init track services?

A

boot & shutdown

89
Q

Does init in Linux System-V use runlevels ?

A

Yes

90
Q

Using Classic init Linux, when the system is powered on and after the kernel if fully running, what is the first process to start?

A

init

91
Q

In Classic init Linux, what is responsible for the setup of the entire user environment?

A

init

92
Q

The init process starts as what process id (PID)?

A

1

93
Q

In Classic Linux, what is the parent process to all other processes and adopts all orphaned processes in the user space?

A

init

PID 1

94
Q

(T/F) init was created at a time when parallel processing and changes to a running system did not exists, put they are now commonplace.

A

True

95
Q

(T/F) init is aware of changes made to the system while it is running.

A

False

96
Q

When is the only time that init deals with services?

A

Startup and Shutdown