Module 2 - 04-2 Flashcards

Linux distributions

1
Q

What are different versions of Linux called?

A

Distributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Distributions sometimes called?

A
  • Distros
  • Flavors of Linux
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most important component of the Linux OS?

A

The kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Kerner so important?

A

The Linux kernel is open source.
Anyone can take the kernel and modify it to build a new distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Distributions

A

Different distributions are used for different reasons.
Different Linux distributions contain different preinstalled programs, user interfaces, and much more.
A lot of this is based on what the Linux user needs, but some distros are also chosen based on preference.

The advantage of using Linux as an OS is that you can customize it.
Distributions include the Linux kernel, utilities, a package management system, and an installer.
Linux is open source, and anyone can contribute to adding to the source code.
That is how new distributions are created.

All distros are derived from another distro, but there are a few that are considered parent distributions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different Parent Distributions?

A
  • Red Hat®
  • Slackware®
  • Debian
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Red Hat® is the parent of what Distribution(s)?

A

CentOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Slackware® is the parent of what Distribution(s)?

A

SUSE®

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Debian is the parent of what Distribution(s)?

A
  • Ubuntu
  • KALI LINUX™
  • Parrot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of components might be different from one Linux distribution to another? Select three answers.

  • Their pre-installed programs
  • Their user interfaces
  • Their parent distributions
  • Their kernels
A
  • Their pre-installed programs
  • Their user interfaces
  • Their parent distributions

The pre-installed programs, user interfaces, and parent distributions might differ from one Linux distribution to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain KALI LINUX ™

A

A Linux distribution that’s widely used in security.

KALI LINUX™ is a trademark of Offensive Security (OffSec) and is Debian derived.
This open-source distro was made specifically with penetration testing and digital forensics in mind.
There are many tools pre-installed into KALI LINUX™.
It’s important to note that KALI LINUX™ should be used on a virtual machine.
This prevents damage to your system in the event its tools are used improperly.
An additional benefit is that using a virtual machine gives you the ability to revert to a previous state.

KALI LINUX™ has numerous tools that are useful during penetration testing.

KALI LINUX™ is also a useful distribution for security professionals who are involved in digital forensic work.
It has a large number of tools that can be used for this.

This distribution has many tools used to conduct pen testing and digital forensics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Penetration test

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What penetration testing tools does KALI LINUX™ have?

A
  • Metasploit
  • Burp Suite
  • John the Ripper
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Metasploit

A

A tool used to look for and exploit vulnerabilities on machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Burp Suite

A

A tool that helps to test for weaknesses in web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain John the Ripper

A

A tool used to guess passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Digital forensics

A

The process of collecting and analyzing data to determine what has happened after an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What digital forensic tools does KALI LINUX™ have?

A
  • tcpdump
  • Wireshark
  • Autopsy®
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain tcpdump

A

It is a command-line packet analyzer.

It’s used to capture network traffic.

20
Q

Explain Wireshark

A

It has a graphical user interface that can be used to analyze live and captured network traffic.

21
Q

Explain Autopsy®

A

A forensic tool used to analyze hard drives and smartphones

22
Q

Which of the following statements accurately describe the KALI LINUX ™ distribution? Select all that apply.

  • It should be used on a virtual machine.
  • It is derived from Debian.
  • It contains many pre-installed tools that can be used for cybersecurity tasks.
  • It is a closed-source distribution.
A
  • It should be used on a virtual machine.
  • It is derived from Debian.
  • It contains many pre-installed tools that can be used for cybersecurity tasks.

KALI LINUX ™ is a Debian-derived distribution, it contains many pre-installed tools for cybersecurity tasks, and it should be used on a virtual machine. It is an open-source distribution.

23
Q

What are other Linux Distributions?

A
  • KALI LINUX ™
  • Ubuntu
  • Parrot
  • Red Hat® Enterprise Linux®
  • AlmaLinux
24
Q

Describe KALI LINUX ™

A

KALI LINUX ™ is an open-source distribution of Linux that is widely used in the security industry.

It is Debian-based and pre-installed with many useful tools for penetration testing and digital forensics which are key activities in the security industry.

However, KALI LINUX ™ is not the only Linux distribution that is used in cybersecurity.

25
Q

Describe Ubuntu

A

Ubuntu is an open-source, user-friendly distribution that is widely used in security and other industries.

It has both a command-line interface (CLI) and a graphical user interface (GUI).

It is Debian-derived and includes common applications by default.
Users can also download many more applications from a package manager, including security-focused tools.
Because of its wide use, Ubuntu has an especially large number of community resources to support users.

Ubuntu is also widely used for cloud computing.
As organizations migrate to cloud servers, cybersecurity work may more regularly involve Ubuntu derivatives.

26
Q

Describe Parrot

A

Parrot is an open-source distribution that is commonly used for security.

Parrot comes with pre-installed tools related to penetration testing and digital forensics and is based on Debian

27
Q

Describe Red Hat® Enterprise Linux®

A

Red Hat Enterprise Linux is a subscription-based distribution of Linux built for enterprise use.

Red Hat is not free, which is a major difference from the previously mentioned distributions.

Because it’s built and supported for enterprise use, Red Hat also offers a dedicated support team for customers to call about issues.

28
Q

Describe AlmaLinux

A

AlmaLinux is a community-driven Linux distribution that was created as a stable replacement for CentOS.

CentOS was an open-source distribution that is closely related to Red Hat, and its final stable release, CentOS 8, was in December 2021.
CentOS used source code published by Red Hat to provide a similar platform.

AlmaLinux is designed to be a drop-in replacement for CentOS 8.
This ensures that applications and configurations that worked on CentOS will continue to function on AlmaLinux.

29
Q

Define Package

A

A piece of software that can be combined with other packages to form an application.

Some packages may be large enough to form applications on their own.

Packages contain the files necessary for an application to be installed.

These files include dependencies, which are supplemental files used to run an application.

Note:
It’s important to use the most recent version of a package when possible.
The most recent version has the most up-to-date bug fixes and security patches. These help keep your system more secure.

30
Q

Define Dependencies

A

Supplemental files used to run an application

31
Q

Define Package manager

A

A tool that helps users install, manage, and remove packages or applications.

Package managers can help resolve any issues with dependencies and perform other management tasks.

Linux uses multiple package managers.

32
Q

What are the different types of package managers?

A
  • Red Hat Package Manager (RPM)
  • dpkg
33
Q

What does RPM stand for?

A

Red Hat Package Manager (RPM)

34
Q

Explain Red Hat Package Manager (RPM)

A

Red Hat Package Manager (RPM) can be used for Linux distributions derived from Red Hat.
Red Hat Package Manager (RPM) has files which use the .rpm file extension, such as Package-Version-Release_Architecture.rpm.

35
Q

Explain dpkg

A

dpkg can be used for Linux distributions derived from Debian.
Debian-derived Linux distributions, such as dpkg, have files which use the .deb file extension, such as Package_Version-Release_Architecture.deb.

36
Q

What file extension does Red Hat Package Manager (RPM) use?

A

.rpm file extension

37
Q

What file extension does dpkg use?

A

.deb file extension

38
Q

Explain Package management tools

A

They allow you to easily work with packages through the shell.
Package management tools are sometimes utilized instead of package managers because they allow users to more easily perform basic tasks, such as installing a new package.

39
Q

What are two notable package management tools?

A
  • Advanced Package Tool (APT)
  • Yellowdog Updater Modified (YUM)
40
Q

What does APT stand for?

A

Advanced Package Tool (APT)

41
Q

Define APT

A

A tool used with Debian-derived distributions.

It is run from the command-line interface to manage, search, and install packages.

42
Q

What does YUM stand for?

A

Yellowdog Updater Modified (YUM)

43
Q

Define YUM

A

A tool used with Red Hat-derived distributions.

It is run from the command-line interface to manage, search, and install packages.
YUM works with .rpm files.

44
Q

Because the _____ is open source, anyone can modify it to build new Linux distributions.

  • application
  • kernel
  • shell
  • hardware
A

shell

Because the kernel is open source, anyone can modify it to build new Linux distributions. The kernel is the component of the Linux OS that manages processes and memory.

45
Q

What is KALI LINUX ™?
(KALI LINUX ™ is a trademark of OffSec.)

  • A tool with a graphical user interface that can be used to analyze live and captured network traffic
  • A tool used to guess passwords
  • A subscription-based Linux distribution built for enterprise use
  • A Debian-derived, open-source distribution of Linux designed for security tasks
A

A Debian-derived, open-source distribution of Linux designed for security tasks

KALI LINUX ™ is a Debian-derived, open-source distribution of Linux designed for security tasks, such as penetration testing and digital forensics.

46
Q

What is an open-source, user-friendly distribution derived from Debian that is widely used in security and other industries?

  • Ubuntu
  • tcpdump
  • Red Hat
  • Autopsy
A

Ubuntu

Ubuntu is an open-source, user-friendly distribution derived from Debian that is widely used in security and other industries. Because of its wide use, Ubuntu has a large number of community resources to support users.

47
Q

Which of the following are distributions of Linux? Select all that apply.

  • CentOS
  • Pen Test
  • Parrot
  • Red Hat
A
  • CentOS
  • Parrot
  • Red Hat

Red Hat, CentOS, and Parrot are all distributions of Linux.