IS3440 CHAP 2 BASIC COMPONENTS OF LINUX SECURITY Flashcards

1
Q

COMMAND ____ is the Linux packet filtering command for firewalls and masquerading. Primary use is of packet filtering firewalls; it can also be used in network address translation.

A

COMMAND

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COMMAND ___ is the RPC port number mapper, commonly used for services such as NFS and NIS.

A

COMMAND

portmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COMMAND ___ is the daemon for the SSH service.

A

COMMAND

sshd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COMMAND ___ is the system log message service, associated with the syslog daemon. When combined with the kernel log daemon, known as klogd, it is sometimes shown as the sysklogd daemon.

A

COMMAND

syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Linux, ___ allows authorized users to set the permissions associated with a file or directory. Those permissions can supersede standard discretionary access controls.

A

(ACLs) ACCESS CONTROL LISTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is when the source code of a kernel is compiled in an installable package, it is changed from a human-readable format to a binary format readable only by a computer.

A

BINARY KERNEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is the most common DNS server on the Internet, originally created at the University of California at Berkeley, it is maintained by the Internet Systems Consortium.

A

(BIND) BERKELEY INTERNET NAME DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is often known as a rebuild because it is a distribution built by third parties, based on source code released for the Red Hat Enterprise Linux distribution and is short for the Community Enterprise Operating System.

A

CentOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is the default print service for most modern Linux distributions. By default this uses the (IPP), but it can also administer with printers in a number of other protocols.

A

(CUPS)COMMON UNIX PRINTING SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is an email server developed at Carnegie-Mellon University, primarily for IMAP version 4 email delivery.

A

CYRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is the group of services and daemons started by default when Linux is booted. Other services and daemons are started in other ___. If Linux is already running, a move to the ___ may also stop other services and daemons.

A

DEFAULT RUNLEVEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a security control system that limits access to objects such as files and directories to specified users and groups.

A

DISCRETIONARY ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a relatively light-weight DNS server alternative to BIND. It is released under a public-domain license, which is not open source.

A

(djbdns) DANIEL J BERNSTEIN’S DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is a hierarchical database of domain names and Internet Protocol (IP) addresses. Two major services on Linux are BIND and djbdns.

A

(DNS) DOMAIN NAME SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is an open source email service, designed for regular and secure versions of the POP and IMAP protocols.

A

DOVECOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is the open source SMTP server developed by the University of Cambridge and is the default MTA for Debian systems.

A

EXIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ is a protocol and service for exchanging files.

A

(FTP) FILE TRANSFER PROTOCOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

___ is a graphical login manager built by the developers of the GNOME Desktop Environment.
It may be used to log into graphical desktop environments other than GNOME.

A

(GDM) GNOME Display Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ is the default boot loader for Ubuntu, Red Hat, and many other Linux distributions. There are two versions in common use, with different options for security.

A

(GRUB) GRAND UNIFIED BOOTLOADER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In Linux, the ___ is separate from but requires the use of an X Window System Server. It may also include a window manager to control the placement of windows within that GUI. Two types are GNOME and KDE.

A

GRAPHICAL DESKTOP ENVIRONMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A ___ is for graphical logins to a Linux GUI.

Three standard Linux graphical login managers are GDM, KDM, and XDM.

A

GRAPHICAL LOGIN MANAGER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ is a computer system designed to detect attempts by black-hat hackers to break into a network.
It includes data that appears to be of value.
It is carefully monitored, and isolated from other systems on the local network.

A

HONEYPOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

___ is a graphical login manager built by the developers of KDE and may be used to log into graphical desktop environments other than KDE.

A

(KDM) KDE DISPLAY MANAGER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

___ is a version of the Telnet server that can use Kerberos tickets to enhance security.

A

KERBEROS TELNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

___ is the core component of the operating system, which supports communication between applications and hardware.

A

KERNEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
\_\_\_ is a virtual machine monitor.  
On Linux systems, it requires a specialized kernel module and supports hardware virtualization and para-virtualization.
A

(KVM)

KERNEL-BASED VIRTUAL MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

___ is a Linux distribution most well known for its live CDs and DVDs.

A

KNOPPIX

28
Q

___ is a unified collection of applications, services, drivers, and libraries configured with a Linux kernel.

A

LINUX DISTRIBUTION

29
Q

___The core of the Linux operating system. Different Linux kernels are in effect different operating systems. It includes a monolithic core and modular components.

A

LINUX KERNEL

30
Q

___ is a nonprofit group established to distribute the Linux kernel and other open source software.

A

LINUX KERNEL ORGANIZATION

31
Q

___ is an alternative Linux boot loader.

It is a legacy boot loader for many Linux distributions.

A

(LILO) LINUX LOADER

32
Q

___ may refer to a CD or DVD with a bootable operating system.
That same data may also be loaded on a USB drive. When loaded, it provides password-free root administrative access to the system.

A

LIVE CD

33
Q

___ is a kernel with components that are loaded during the boot process.
Loaded components depend on detected hardware, configuration files, and more.

A

MODULAR KERNEL

34
Q

___ is a kernel with components that are loaded during the boot process.
Loaded components depend on detected hardware, configuration files, and more.

A

MONOLITHIC KERNEL

35
Q

___ is the open source database program.
It is a Structured Query Language database.
It is currently owned by Oracle.

A

MySQL

36
Q

___ is a protocol and service that synchronizes clocks over a network.

A

(NTP) NETWORK TIME PROTOCOL

37
Q

___ is a development practice in which source code is released publicly.
Its licenses allow others to use and even improve upon that same source code, as long as they give credit to the original developers. The GNU General Public License (GPL) is an example.

A

OPEN SOURCE

38
Q

When a security issue requires a kernel ___, you will have to repeat the process of customizing and recompiling a kernel.
In other words, in the context of the Linux kernel, a ____ is an incremental upgrade to the Linux kernel.

A

PATCH

39
Q

For Linux, ___ is a series of configuration files that provide dynamic authentication for administrative and other services.

A

(PAM) PLUGGABLE AUTHENTICATION MODULES

40
Q

___ supports fine-grained control administrative tools from regular accounts. The focus is on the GNOME desktop environment.

A

POLICYKIT

41
Q

A relatively popular open source alternative is ___.
It is the default MTA for the Ubuntu and SUSE Linux distributions.
It is an open source SMTP server originally developed at IBM and it is designed to be simpler than sendmail.

A

POSTFIX

42
Q

___ is an open source database alternative program, sponsored by a variety of open source and other IT companies.

A

PostgreSQL

43
Q

___ is the self-declared replacement for sendmail, developed by Daniel J. Bernstein, who also developed dfbdns.

A

QMAIL

44
Q

___ is a mode of operation in Linux associated with a group of services and daemons. Specified services and daemons are started or killed when starting a particular ___.

A

RUNLEVEL

45
Q

___ is the open source SMTP server maintained by the Sendmail Consortium. Do not confuse this with the commercial SMTP server know as Sendmail.
(Hint: No caps in sendmail)

A

sendmail

46
Q

___ is a commercial SMTP server painted by Sendmail, Inc. Do not confuse this with the open source SMTP server with a very similar name.
(Hint: Has caps in Sendmail)

A

Sendmail

47
Q

___ is a human-readable computer language that can be collected and compiled into computer program, library, or application.

A

SOURCE CODE

48
Q

___ is a protocol and service that uses a simplified form of FTP.

A

(TFTP) TRIVIAL FILE TRANSFER PROTOCOL

49
Q

___is the open source FTP server used by developers of Red Hat, SUSE, and Debian to share their distributions.

A

(vsftpd) very secure File Transfer Protocol daemon

50
Q

___ is a component of the Samba file server that supports integration of Linux/Unix and Microsoft authentication informations.

A

Winbind

51
Q

___ is a graphical login manager built by the developers of the X.Org GUI server.

A

(XDM) X Display Manager

52
Q

___ is an older X Window System Server, commonly used in older Linux distributions.

A

XFree86

53
Q

___ is a virtual machine monitor developed at the University of Cambridge. On the Linux systems, it requires a specialized kernel. It supports hardware virtualization and paravirtualization.

A

Xen

54
Q
  1. Which of the following statements best describes the structure of the Linux kernel?
  2. A single monolithic kernel
  3. A completely modular kernel
  4. A modular core with monolithic components
  5. A monolithic core with modular components
A

A monolithic core with modular components

55
Q
  1. The Web site associated with the Linux Kernel Organization is ___?
A

http://kernal.org

56
Q
  1. Which of the following statements is NOT true about a live CD distribution? Assume your system can boot from appropriate locations.
  2. It can be booted from a DVD drive
  3. It can be booted from a USB port
  4. It automatically installs that Linux distribution on your system
  5. It provides administrative control of your system without a passport.
A

It automatically installs that Linux distribution on your system

57
Q
  1. Which of the following is a security risk associated with the LILO boot loader?
  2. Changes to LILO can be password protected
  3. It supports password-free access to the administrative account
  4. It allows a user to boot Microsoft Windows.
  5. It supports the booting of a monolithic Linux kernel
A

It supports password-free access to the administrative account

58
Q
  1. Which of the following services should NOT be disabled on a bastion host used as an FTP server> Assume that the host is administered remotely, over an encrypted connection.
  2. SSH
  3. Telnet
  4. CUPS
  5. COMMAND iptables
A

SSH

59
Q
  1. Which of the following is NOT a potential security issue with respect to the Linux GUI?
  2. The Linux GUI is a client-server system
  3. Linux GUI applications can be networked
  4. Linux GUI applications can be accessed over an SSH connection
  5. Users can log into the Linux GUI remotely
A

Linux GUI applications can be accessed over an SSH connection

60
Q
  1. Which of the following authentication tools work locally?
  2. NIS
  3. PAM
  4. LDAP
  5. Winbind
A

PAM

61
Q
  1. Which of the following is an example of discretionary access controls?
  2. SELinux
  3. AppArmor
  4. PolicyKit
  5. User-defined read, write, and execute permissions
A

User-defined read, write, and execute permissions

62
Q
  1. Which of the following options is NOT used to block access from certain IP addresses?
  2. COMMAND iptables
  3. SELinux
  4. TCP Wrappers
  5. Extended internet super server
A

SELinux

63
Q
  1. Which of the following statements best describes the role of mandatory access controls?
  2. They protect other services after a security breach in an account
  3. They protect a system from black-hat hacker access through firewalls
  4. They disable clear-text services such as Telnet
  5. They provide specific requirements for access to critical services
A

They protect other services after a security breach in an account

64
Q
  1. Packages associated with SSH include a client for which of the following protocols?
  2. Samba
  3. FTP
  4. Telnet
  5. SMTP
A

FTP

65
Q
  1. Under normal circumstances, what happens when a system can’t be booted with a newly installed Linux kernel?
  2. You need to install the old kernel
  3. The system can’t be booted. You need to reinstall that Linux distribution
  4. The system can not be booted. You need to recover the old Linux kernel with the help of a recovery or rescue mode for that distribution
  5. The old kernel is still available through the boot loader
A

The old kernel is still available through the boot loader

66
Q
  1. What is the best course of action if you want to take control of those packages that are updated on your distribution?
  2. Create your own update repository
  3. Deselect the packages that should not be updated
    3 Change to a different distribution
  4. Use the update repositories from a different distribution
A

Create your own update repository

67
Q
  1. Which of the following is NOT a standard open source option for SMTP email services?
  2. sendmail
  3. Postfix
  4. Dovecot
  5. Exim
A

Dovecot