IS3440 CHAP 7 NETWORKS, FIREWALLS, AND MORE Flashcards

1
Q

(COMMAND) ___ lists the configured profiles of various commands and services.

A

(COMMAND) apparmor_status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(COMMAND) ___ is a service for running administrative jobs on a one-time basis; protected by the /etc/at.allow and /etc/at.deny files.

A

(COMMAND) at

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(COMMAND) ___ is a SELinux command that can be used to change the AVC contexts associated with a file.

A

(COMMAND) chcon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(COMMAND) ___ is a service for running administrative jobs on a regular basis; protected by the /etc/cron.allow and /etc/cron.deny files.

A

(COMMAND) cron

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(COMMAND) ___ is a SELinux command that returns the context settings of a specified file or directory.

A

(COMMAND) secon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(COMMAND) ___ Is a SELinux command that returns the overall status of SELinux on the local system.

A

(COMMAND) sestatus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ in security, is an access permission represented by a bitmap; commonly stored for SELinux security in an ___ ___ cache.

A

Access vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is an access permission associated with SELinux.

A

(AVC) Access vector cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is a mandatory access control system used to create security profiles for different programs. Uses Linux security modules in the kernel. Not compatible with SELinux.

A

(AppArmor) Application Armor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a protocol for validating users before allowing access, which includes a challenge to verify the identity of a user.

A

(CHAP) Challenge-Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ Is an attack based on overloading a network service, denying access to regular users. Not all are malicious, as they can be accidental results of certain types of connection attempts. Nevertheless, they should be blocked or slowed down as if they were attacks.

A

(DoS) Denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a professional organization; it is also the group behind standards such as 802.11 for wireless communication.

A

(IEEE) Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a group of standards for digital transmission of voice and data over the public switched telephone network.

A

(ISDN) Integrated Services digital Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is the organization responsible for domain names, IP addresses, and Transmission Control Protocol/Internet Protocol (TCP/IP) protocols on the internet.

A

(IANA) Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ supports atuomated Internet Protocol (IP) addressing without a Dynamic Host Configuration Protocol (DHCP) server. Related to Microsoft’s automatic private IP addressing and Apple’s Bonjour protocols. Communicates using both TCP and UDP over port 5353.

A

(mDNS) Multicast Domain Name Service protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a protocol for validating users before allowing access.

A

(PAP) Password Authentication Protocol

17
Q

____ is a reference to the current digital telephone network.

A

(PSDN) Public switched data network

18
Q

___ is a reference to the regular telephone for voice communications.

A

(PSTN) Public switched telephone network

19
Q

___ is a system for remote user authentication, frequently used to authenticate connections over telephone modems.

A

(RADIUS) Remote Authentication Dial in User Service

20
Q

___ is a mandatory access control system that uses Linux security modules in the kernel. Developed by the US National Security Agency. Not compatible with AppArmor.

A

(SELinux) Security Enhanced Linux

21
Q

___ is an access control list system for services associated with the internet super servers. It also can protect services linked to the
libwrap.so.0 library.

A

TCP Wrappers

22
Q

___ is a modulator-demodulator for translating data bits into the sine waves associated with the PSTN. Cable ___ and DSL modems are not true modems, as they do not modulate or demodulate data.

A

Telephone modem

23
Q

___ is a method for interpreting the emissions from computer displays to recover the associated image.

A

Van Eck phreaking

24
Q

___ is software that can help detect unauthorized attacks on a wireless network; one example is available from the aircrack-ng package.

A

(WIDS) Wireless intrusion detection system

25
Q
  1. Well known TCP/IP ports range from ___ to ___.
A

0 to 1023

26
Q
  1. The (command) nmap checks for open ports on a remote system.
    TRUE OR FALSE
A

TRUE

27
Q
  1. Which of the following configuration files is considered first with respect to TCP Wrapper security?
  2. /etc/inetd.conf
  3. /etc/xinetd.conf
  4. /etc/hosts.allow
  5. /etc/hosts.deny
A

/etc/hosts.allow

28
Q
  1. Which of the following library files is associated with TCP Wrappers?
  2. /etc/libwrap/so/0
  3. /lib/libwrap.so.0
  4. /usr/lib/libwrap.so/0
  5. /var/lib/libwrap.so.0
A

/lib/libwrap.so.0

29
Q
  1. Which of the following iptables command switches adds a rule to the middle of a chain?
  2. -A
  3. -I
  4. -L
  5. -C
A

-I

30
Q
  1. Which of the following actions is NOT used with the -j switch for the iptables command?
  2. DROP
  3. REJECT
  4. LOG
  5. FORWARD
A

FORWARD

31
Q
  1. The iptables command switch associated with a destination port is ___.
A

–dport

32
Q
  1. The PSDN network is associated with regular telephone modems.
    TRUE OR FALSE
A

FALSE

33
Q
  1. Which of these files must exist for regular users to access the a t daemon?
  2. /etc/a t
  3. /etc/a t.deny
  4. /etc/a t.conf
  5. /etc/a t.a t.deny
A

/etc/a t.deny

34
Q
  1. which of the following IEEE protocols is most closely associated with wireless networking?
  2. 802.3
  3. 802.5
  4. 802.11
  5. 802.15
A

802.11

35
Q
  1. Which of the following commands lists the SELinux characteristics of a file?
  2. ls filename
  3. ls -SE filename
  4. ls -l filename
  5. ls -Z filename
A

s -Z filename

36
Q
  1. Which of the following commands can be used to customize the SELinux characteristics of a file?
  2. fixfiles
  3. chcon
  4. restorecon
  5. secon
A

chcon

37
Q
  1. To start the SELinux Troubleshooter in a GUI, run the following command: _____.
A

sealert -b

38
Q
  1. Which of the following directories include active AppArmor profiles?
  2. /etc/apparmor/
  3. /etc/apparmor.d/
  4. /use/share/doc/apparmor-profiles/extras/
  5. /usr/share/doc/apparmor-profiles/
A

/etc/apparmor.d/