Kahoot Review Flashcards

1
Q

What is the range of UIDs?

A

100 - 60000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the PID of init?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When using a Linux system, HTTP headers are case sensitive.

[TRUE / FALSE]

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the fundamental interface between an application and the Linux kernel (OS)?

A

systemcalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DPKG uses which tool?

(Hint - 3 letter acronym)

A

APT

(Advanced Packaging Tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command is used to set passwords to expire?

A

passwd -e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a method of protecting file databases?

A

Use of dedicated servers access via telnet

(telnet is not secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Technical Implementation Guides are ________.

A

Used for setting cyber security standards in the DOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[True / False]

The kernel uses device drivers to communicate with the hardware without knowing how it works.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What provides Network Devices a way to send events to a server?

A

syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which shell cannot interact with users and is run from a script?

A

Non-interactive shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which UID is usually assigned to system accounts?

A

Below 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following commands is used to display a network’s interface configuration?

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Banner grabbing can NOT be used to exploit which of the following pieces of information?

  • Software version
  • Active ports
  • Open ports
  • Open services
A

Active ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where is the primary GID and group name stores as entries?

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which command displays the status of currently loaded LKMs?

A

lsmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which shell was the first to appear on UNIX systems?

A

Bourne Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the default prompt for C Shell (csh)?

A

%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the default prompt for bash?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When init starts, it reads a config file used by initialization systems. Where is this file stored?

A

/etc/inittab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command lists all PCI buses in the system along with the devices connected to them?

A

lsmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ _____ is the privileged mode where the process has unrestricted access to system resources like hardware and memory.

A

Kernel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the package management system created by the RedHat distribution?

A

RPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

[TRUE / FALSE]

Samba has two security modes: User-Level and Root-Level

25
Which shell actively reads commands from user input?
Interactive shell
26
[TRUE / FALSE] YUM packet manager is an upgraded version of DNF.
FALSE Note: the reverse is true. DNF is the upgraded version of YUM.
27
What does LKM stand for?
Loadable Kernel Modules
28
Which of the following is a daemon associated with Samba? * mmdb * bmbd * stmp * nmdb
nmdb
29
TCP wrappers depend on which of the following files?
etc/host.allow
30
Which User-Level implementation of Samba allows the Samba server to join an Active Directory Security using Kerberos?
Active Directory Security Mode
31
Which commands change the current shell?
chsh
32
HTTP Requests and Responses are a type of HTTP header. [True / False]
FALSE
33
Which command is used to locate a user's UID?
id username (enter username) OR id --user (will show current logged in User)
34
What is the RedHat frontend for iptables?
firewalld
35
Which command is used to create user accounts?
Useradd
36
Which of the following acts like the brain of Linux and controls hardware?
Kernel
37
What is the structure of an IP table?
iptables → Tables → Chains → Rules
38
LDAP does **NOT** store the authentication information of which of the following: * Users * Groups * Applications * Servers
Servers
39
A program that has been executed and is in a running state is called what?
Process
40
Where are local passwords stored?
/etc/shadow
41
Which of the following key files contains the home directory of a privileged User? * /home * /root * /dev * /etc
/root
42
[TRUE / FALSE] Network-Based security uses firewalls, SIEM, and secure configurations to protect your network from internal threats.
FALSE
43
Which of the following interfaces indicates an ethernet interface? * eth * lo * wl * en
en
44
[True / False] An environmental variable is a variable that is set across user accounts.
True
45
Which command displays the login shell the user is currently operating in?
Echo $0
46
Which command displays environmental variables?
printenv
47
[True/ False] Users can invent a system call of their own and install it as an LKM.
True
48
Which of the following is the unique number that identifies syscall? * 0 * 1 * 35 * 60
0
49
Which iptable is used to determine whether a packet is exempt from connection tracking?
Raw
50
Which type of shell is running when you log into a system via terminal or ssh?
Login shell
51
Which commands trace signal calls and signals?
strace
52
Which of the following is allowed when using a restrictive shell? * Use of cd command * Use of output redirection * Set or change value of select variables * None of the above
None of the above
53
Which of iptable's main tables contains all 5 default built-in chains?
Mangle Note: Iptables’s Mangle table is for specialized packet alteration. Mangle table has the following built-in chains. * PREROUTING chain * OUTPUT chain * FORWARD chain * INPUT chain * POSTROUTING chain
54
Which command is used for banner grabbing?
wget
55
Which of the following commands is NOT used for IT administration via the command line? * arp * iftables * ifconfig * ping
ifconfig
56
[TRUE / FALSE] Samba is the most commonly used web server on Linux Systems.
FALSE
57
Which command displays both PID and PPID? * top * ps * ps -elf * ps aux
ps elf
58
What command is used to apply a patch?
patch