Kahoot Review Flashcards

1
Q

What is the range of UIDs?

A

100 - 60000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the PID of init?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When using a Linux system, HTTP headers are case sensitive.

[TRUE / FALSE]

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the fundamental interface between an application and the Linux kernel (OS)?

A

systemcalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DPKG uses which tool?

(Hint - 3 letter acronym)

A

APT

(Advanced Packaging Tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command is used to set passwords to expire?

A

passwd -e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a method of protecting file databases?

A

Use of dedicated servers access via telnet

(telnet is not secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Technical Implementation Guides are ________.

A

Used for setting cyber security standards in the DOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[True / False]

The kernel uses device drivers to communicate with the hardware without knowing how it works.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What provides Network Devices a way to send events to a server?

A

syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which shell cannot interact with users and is run from a script?

A

Non-interactive shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which UID is usually assigned to system accounts?

A

Below 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following commands is used to display a network’s interface configuration?

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Banner grabbing can NOT be used to exploit which of the following pieces of information?

  • Software version
  • Active ports
  • Open ports
  • Open services
A

Active ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where is the primary GID and group name stores as entries?

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which command displays the status of currently loaded LKMs?

A

lsmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which shell was the first to appear on UNIX systems?

A

Bourne Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the default prompt for C Shell (csh)?

A

%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the default prompt for bash?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When init starts, it reads a config file used by initialization systems. Where is this file stored?

A

/etc/inittab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command lists all PCI buses in the system along with the devices connected to them?

A

lsmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ _____ is the privileged mode where the process has unrestricted access to system resources like hardware and memory.

A

Kernel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the package management system created by the RedHat distribution?

A

RPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

[TRUE / FALSE]

Samba has two security modes: User-Level and Root-Level

A

FALSE

25
Q

Which shell actively reads commands from user input?

A

Interactive shell

26
Q

[TRUE / FALSE]

YUM packet manager is an upgraded version of DNF.

A

FALSE

Note: the reverse is true. DNF is the upgraded version of YUM.

27
Q

What does LKM stand for?

A

Loadable Kernel Modules

28
Q

Which of the following is a daemon associated with Samba?

  • mmdb
  • bmbd
  • stmp
  • nmdb
A

nmdb

29
Q

TCP wrappers depend on which of the following files?

A

etc/host.allow

30
Q

Which User-Level implementation of Samba allows the Samba server to join an Active Directory Security using Kerberos?

A

Active Directory Security Mode

31
Q

Which commands change the current shell?

A

chsh

32
Q

HTTP Requests and Responses are a type of HTTP header.

[True / False]

A

FALSE

33
Q

Which command is used to locate a user’s UID?

A

id username (enter username)

OR

id –user (will show current logged in User)

34
Q

What is the RedHat frontend for iptables?

A

firewalld

35
Q

Which command is used to create user accounts?

A

Useradd

36
Q

Which of the following acts like the brain of Linux and controls hardware?

A

Kernel

37
Q

What is the structure of an IP table?

A

iptables → Tables → Chains → Rules

38
Q

LDAP does NOT store the authentication information of which of the following:

  • Users
  • Groups
  • Applications
  • Servers
A

Servers

39
Q

A program that has been executed and is in a running state is called what?

A

Process

40
Q

Where are local passwords stored?

A

/etc/shadow

41
Q

Which of the following key files contains the home directory of a privileged User?

  • /home
  • /root
  • /dev
  • /etc
A

/root

42
Q

[TRUE / FALSE]

Network-Based security uses firewalls, SIEM, and secure configurations to protect your network from internal threats.

A

FALSE

43
Q

Which of the following interfaces indicates an ethernet interface?

  • eth
  • lo
  • wl
  • en
A

en

44
Q

[True / False]

An environmental variable is a variable that is set across user accounts.

A

True

45
Q

Which command displays the login shell the user is currently operating in?

A

Echo $0

46
Q

Which command displays environmental variables?

A

printenv

47
Q

[True/ False]

Users can invent a system call of their own and install it as an LKM.

A

True

48
Q

Which of the following is the unique number that identifies syscall?

  • 0
  • 1
  • 35
  • 60
A

0

49
Q

Which iptable is used to determine whether a packet is exempt from connection tracking?

A

Raw

50
Q

Which type of shell is running when you log into a system via terminal or ssh?

A

Login shell

51
Q

Which commands trace signal calls and signals?

A

strace

52
Q

Which of the following is allowed when using a restrictive shell?

  • Use of cd command
  • Use of output redirection
  • Set or change value of select variables
  • None of the above
A

None of the above

53
Q

Which of iptable’s main tables contains all 5 default built-in chains?

A

Mangle

Note: Iptables’s Mangle table is for specialized packet alteration. Mangle table has the following built-in chains.

  • PREROUTING chain
  • OUTPUT chain
  • FORWARD chain
  • INPUT chain
  • POSTROUTING chain
54
Q

Which command is used for banner grabbing?

A

wget

55
Q

Which of the following commands is NOT used for IT administration via the command line?

  • arp
  • iftables
  • ifconfig
  • ping
A

ifconfig

56
Q

[TRUE / FALSE]

Samba is the most commonly used web server on Linux Systems.

A

FALSE

57
Q

Which command displays both PID and PPID?

  • top
  • ps
  • ps -elf
  • ps aux
A

ps elf

58
Q

What command is used to apply a patch?

A

patch