IS3440 CHAP 2 BASIC COMPONENTS OF LINUX SECURITY Flashcards
COMMAND ____ is the Linux packet filtering command for firewalls and masquerading. Primary use is of packet filtering firewalls; it can also be used in network address translation.
COMMAND
iptables
COMMAND ___ is the RPC port number mapper, commonly used for services such as NFS and NIS.
COMMAND
portmap
COMMAND ___ is the daemon for the SSH service.
COMMAND
sshd
COMMAND ___ is the system log message service, associated with the syslog daemon. When combined with the kernel log daemon, known as klogd, it is sometimes shown as the sysklogd daemon.
COMMAND
syslog
In Linux, ___ allows authorized users to set the permissions associated with a file or directory. Those permissions can supersede standard discretionary access controls.
(ACLs) ACCESS CONTROL LISTS
___ is when the source code of a kernel is compiled in an installable package, it is changed from a human-readable format to a binary format readable only by a computer.
BINARY KERNEL
____ is the most common DNS server on the Internet, originally created at the University of California at Berkeley, it is maintained by the Internet Systems Consortium.
(BIND) BERKELEY INTERNET NAME DOMAIN
___ is often known as a rebuild because it is a distribution built by third parties, based on source code released for the Red Hat Enterprise Linux distribution and is short for the Community Enterprise Operating System.
CentOS
___ is the default print service for most modern Linux distributions. By default this uses the (IPP), but it can also administer with printers in a number of other protocols.
(CUPS)COMMON UNIX PRINTING SYSTEM
___ is an email server developed at Carnegie-Mellon University, primarily for IMAP version 4 email delivery.
CYRUS
___ is the group of services and daemons started by default when Linux is booted. Other services and daemons are started in other ___. If Linux is already running, a move to the ___ may also stop other services and daemons.
DEFAULT RUNLEVEL
___ is a security control system that limits access to objects such as files and directories to specified users and groups.
DISCRETIONARY ACCESS CONTROL
___ is a relatively light-weight DNS server alternative to BIND. It is released under a public-domain license, which is not open source.
(djbdns) DANIEL J BERNSTEIN’S DNS
___ is a hierarchical database of domain names and Internet Protocol (IP) addresses. Two major services on Linux are BIND and djbdns.
(DNS) DOMAIN NAME SYSTEM
___ is an open source email service, designed for regular and secure versions of the POP and IMAP protocols.
DOVECOT
___ is the open source SMTP server developed by the University of Cambridge and is the default MTA for Debian systems.
EXIM
___ is a protocol and service for exchanging files.
(FTP) FILE TRANSFER PROTOCOL
___ is a graphical login manager built by the developers of the GNOME Desktop Environment.
It may be used to log into graphical desktop environments other than GNOME.
(GDM) GNOME Display Manager
___ is the default boot loader for Ubuntu, Red Hat, and many other Linux distributions. There are two versions in common use, with different options for security.
(GRUB) GRAND UNIFIED BOOTLOADER
In Linux, the ___ is separate from but requires the use of an X Window System Server. It may also include a window manager to control the placement of windows within that GUI. Two types are GNOME and KDE.
GRAPHICAL DESKTOP ENVIRONMENT
A ___ is for graphical logins to a Linux GUI.
Three standard Linux graphical login managers are GDM, KDM, and XDM.
GRAPHICAL LOGIN MANAGER
___ is a computer system designed to detect attempts by black-hat hackers to break into a network.
It includes data that appears to be of value.
It is carefully monitored, and isolated from other systems on the local network.
HONEYPOT
___ is a graphical login manager built by the developers of KDE and may be used to log into graphical desktop environments other than KDE.
(KDM) KDE DISPLAY MANAGER
___ is a version of the Telnet server that can use Kerberos tickets to enhance security.
KERBEROS TELNET
___ is the core component of the operating system, which supports communication between applications and hardware.
KERNEL
\_\_\_ is a virtual machine monitor. On Linux systems, it requires a specialized kernel module and supports hardware virtualization and para-virtualization.
(KVM)
KERNEL-BASED VIRTUAL MACHINE