E05: Linux Security Posture Flashcards
What enables packet filtering, NAT, and packet logging?
- Nftables
- iptables
- netfilter
- tables
netfilter
Ubuntu 20.04 for example has netfilter and iptables but has another command-line front end for iptables. What is the command?
ufw (Uncomplicated Firewall)
What was designed to replace the old iptables in pursuit of better performance, scalabiltiy, and useability?
- Nftables
- iptables
- netfilter
- tables
Nftables
Iptables filters packets based on Tables, Chains, Rules, and Targets
T/F
True
Within iptables, what are files that join similar actions and consists of several chains?
- Chains
- rules
- tables
- targets
tables
Within iptables, what is a statement that tells the system what to do with a packet?
- Chains
- rules
- tables
- targets
rules
What is a decision of what to do with a packet.
- chains
- rules
- tables
- targets
targets
Which of the following is not one of the default tables that can be used within iptables?
- Chain
- Filter
- NAT
- Mangle
Chain
What is used to adjust the TCP headers of the packet.
- Raw
- Filter
- NAT
- Mangle
Mangle
What is used to exempt packets from connection tracking?
- Raw
- Filter
- NAT
- Mangle
Raw
The default chains for NAT include all of the following except:
- Prerouting
- Postroutiing
- Input
- Output
Input
The default chains for Filter include all of the following except:
- Routing
- Input
- Output
- Forward
Routing
This table rules for routing packets to networks that cannot be accessed directly.
- Filter
- Mangle
- RAW
- NAT
NAT
For more information on iptables, what command could a user use in a terminal?
man iptables
What Chain in Targets, is defined as targets that keep matching the packets against rules in a chain even when the packet matches a rule?
- Terminating
- Non-Terminating
- Accept
- Reject
Non-Terminating
What option would be utilized in iptables to initiate a protocol check?
- p
- P
- j
- s
p
What option would be utilized in iptables to identify source specification?
- S
- m
- s
- D
-s
What command can be used to see all existing tables in iptables? (full command to include –)
sudo iptables –list
What command can be utilized to set a default policy that alllows all incoming traffic in iptables?
File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted.
T/F
True
What command did we utilize in this lesson to create a hash?
md5sum
File integrity can be verified with ______ hashing tools like md5sum.
MD5
All of the following are common hashing tools except:
- md5sum
- Hash
- HAVAL
- CRC-32
Hash
What is a broad term that covers a multitude of devices, technologies, and processes?
- Switch
- Router
- Security Information
- Network Security
Network Security
The protection and secure configuration of Network Services like DNS Servers, Time Servers, VPN Concentrators that provide secure remote access, and VPN Tunnels to remote sites is also usualy considered network security.
T/F
True
Which command includes the functionality for retrieving the banner details from HTTP servers.
wget
Two main types of Banner grabbing are Active and ________
Passive
What is often termed as Service Fingerprinting?
- HTTP grabbing
- Banner Grabbing
- Active Banner
- Passive Banner
Banner Grabbing
Which banner is described as the attacker collecting data about our target using publically available information i.e. by analyzing the server either with the help of “Error Messages” or by “Sniffing up the Network Traffic”?
- Reactive Banner
- Active Banner
- Passive Banner
- Pattern Banner
Passive Banner
What provides basic traffic filtering of incoming network traffic?
tcp wrappers
TCP Wrappers include two main files which are /etc/hosts.allow and ________
/etc/hosts.deny
What type of security refers to security tools that are deployed at the host level.
- Host-Based
- Network-Based
- Software-Based
- STIGS
Host-Based
What are a configuration standard consisting of cybersecurity requirements that must be adhered to by any organization that is working with the Department of Defense?
- SOP
- OWASP
- STIGs
- NISST
STIGs
What is an implementation of Mandatory Access Control for Linux written and published by the National Security Agency (NSA) that significantly increases the security of a Linux installation?
- Linux
- SSH
- SecureFTP
- SELinux
SELinux
To maintain web host security, you can use what command?
netstat