Module 4 - Basic quiz Flashcards

1
Q

Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?

A

PenTesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a benefit of Linux being an open source operating system?

A

Linux distribution source code can be modified and then recompiled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which method can be used to harden a device?

A

Force periodic password changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this command?

A

To list the processes currently running in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which operating system source code can be downloaded and modified by any person or company?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which file system is the primary file system used by Apple in current Macintosh computers?

A

APFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

ls –l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt

A

read write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?

A

man

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a daemon?

A

A background process that runs without the needfor user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Linux command can be used to display the name of the current working directory?

A

pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

A

transient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?

A

Every application installed will update itself to the latest version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why would a rootkit be used by a hacker?

A

To gain access to a device without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly