Module 4 - Basic quiz Flashcards
Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?
PenTesting
What is a benefit of Linux being an open source operating system?
Linux distribution source code can be modified and then recompiled.
Which method can be used to harden a device?
Force periodic password changes
A system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this command?
To list the processes currently running in the system.
Which operating system source code can be downloaded and modified by any person or company?
Linux
Which file system is the primary file system used by Apple in current Macintosh computers?
APFS
Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?
ls –l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt
read write
In the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?
man
What is a daemon?
A background process that runs without the needfor user interaction.
Which Linux command can be used to display the name of the current working directory?
pwd
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
transient
A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?
80
A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?
Every application installed will update itself to the latest version.
Why would a rootkit be used by a hacker?
To gain access to a device without being detected.