Kahoot Review Flashcards
What is the range of UIDs?
100 - 60000
What is the PID of init?
1
When using a Linux system, HTTP headers are case sensitive.
[TRUE / FALSE]
FALSE
What is the fundamental interface between an application and the Linux kernel (OS)?
systemcalls
DPKG uses which tool?
(Hint - 3 letter acronym)
APT
(Advanced Packaging Tool)
Which command is used to set passwords to expire?
passwd -e
Which of the following is not a method of protecting file databases?
Use of dedicated servers access via telnet
(telnet is not secure)
Security Technical Implementation Guides are ________.
Used for setting cyber security standards in the DOD
[True / False]
The kernel uses device drivers to communicate with the hardware without knowing how it works.
TRUE
What provides Network Devices a way to send events to a server?
syslog
Which shell cannot interact with users and is run from a script?
Non-interactive shell
Which UID is usually assigned to system accounts?
Below 100
Which of the following commands is used to display a network’s interface configuration?
ifconfig
Banner grabbing can NOT be used to exploit which of the following pieces of information?
- Software version
- Active ports
- Open ports
- Open services
Active ports
Where is the primary GID and group name stores as entries?
/etc/passwd
Which command displays the status of currently loaded LKMs?
lsmod
Which shell was the first to appear on UNIX systems?
Bourne Shell
What is the default prompt for C Shell (csh)?
%
What is the default prompt for bash?
$
When init starts, it reads a config file used by initialization systems. Where is this file stored?
/etc/inittab
Which command lists all PCI buses in the system along with the devices connected to them?
lsmod
_____ _____ is the privileged mode where the process has unrestricted access to system resources like hardware and memory.
Kernel Mode
What is the package management system created by the RedHat distribution?
RPM
[TRUE / FALSE]
Samba has two security modes: User-Level and Root-Level
FALSE
Which shell actively reads commands from user input?
Interactive shell
[TRUE / FALSE]
YUM packet manager is an upgraded version of DNF.
FALSE
Note: the reverse is true. DNF is the upgraded version of YUM.
What does LKM stand for?
Loadable Kernel Modules
Which of the following is a daemon associated with Samba?
- mmdb
- bmbd
- stmp
- nmdb
nmdb
TCP wrappers depend on which of the following files?
etc/host.allow
Which User-Level implementation of Samba allows the Samba server to join an Active Directory Security using Kerberos?
Active Directory Security Mode
Which commands change the current shell?
chsh
HTTP Requests and Responses are a type of HTTP header.
[True / False]
FALSE
Which command is used to locate a user’s UID?
id username (enter username)
OR
id –user (will show current logged in User)
What is the RedHat frontend for iptables?
firewalld
Which command is used to create user accounts?
Useradd
Which of the following acts like the brain of Linux and controls hardware?
Kernel
What is the structure of an IP table?
iptables → Tables → Chains → Rules
LDAP does NOT store the authentication information of which of the following:
- Users
- Groups
- Applications
- Servers
Servers
A program that has been executed and is in a running state is called what?
Process
Where are local passwords stored?
/etc/shadow
Which of the following key files contains the home directory of a privileged User?
- /home
- /root
- /dev
- /etc
/root
[TRUE / FALSE]
Network-Based security uses firewalls, SIEM, and secure configurations to protect your network from internal threats.
FALSE
Which of the following interfaces indicates an ethernet interface?
- eth
- lo
- wl
- en
en
[True / False]
An environmental variable is a variable that is set across user accounts.
True
Which command displays the login shell the user is currently operating in?
Echo $0
Which command displays environmental variables?
printenv
[True/ False]
Users can invent a system call of their own and install it as an LKM.
True
Which of the following is the unique number that identifies syscall?
- 0
- 1
- 35
- 60
0
Which iptable is used to determine whether a packet is exempt from connection tracking?
Raw
Which type of shell is running when you log into a system via terminal or ssh?
Login shell
Which commands trace signal calls and signals?
strace
Which of the following is allowed when using a restrictive shell?
- Use of cd command
- Use of output redirection
- Set or change value of select variables
- None of the above
None of the above
Which of iptable’s main tables contains all 5 default built-in chains?
Mangle
Note: Iptables’s Mangle table is for specialized packet alteration. Mangle table has the following built-in chains.
- PREROUTING chain
- OUTPUT chain
- FORWARD chain
- INPUT chain
- POSTROUTING chain
Which command is used for banner grabbing?
wget
Which of the following commands is NOT used for IT administration via the command line?
- arp
- iftables
- ifconfig
- ping
ifconfig
[TRUE / FALSE]
Samba is the most commonly used web server on Linux Systems.
FALSE
Which command displays both PID and PPID?
- top
- ps
- ps -elf
- ps aux
ps elf
What command is used to apply a patch?
patch