Module 4 - Linux Overview Flashcards
Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?
intrusion detection system
malware analysis
PenTesting
firewall
PenTesting
What is a benefit of Linux being an open source operating system?
Linux distribution source code can be modified and then recompiled.
Linux distributions are maintained by a single organization.
Linux distributions must include free support without cost.
Linux distributions are simpler operating systems since they are not designed to be connected to a network.
Linux distribution source code can be modified and then recompiled.
Which method can be used to harden a device?
Allow USB auto-detection.
Force periodic password changes.
Allow users to re-use old passwords.
Allow default services to remain enabled.
Force periodic password changes.
A system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this command?
to list the processes currently running in the system
to display the contents of the current directory
to process a new task
to change file permissions
to list the processes currently running in the system
Which operating system source code can be downloaded and modified by any person or company?
Cisco IOS
Mac OS X
Linux
Windows
Linux
Which file system is the primary file system used by Apple in current Macintosh computers?
CDFS
APFS
ext3
ext2
HFS+
APFS
Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?
read, write, execute
read only
read, write
full access
read, write
In the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?
crontab
man
grep
cat
man
What is a daemon?
a type of security attack
a background process that runs without the need for user interaction
a record to keep track of important events
an application that monitors and analyzes suspicious activity
a background process that runs without the need for user interaction
Which Linux command can be used to display the name of the current working directory?
sudo
pwd
chmod
ps
pwd
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
client
secondary
server
primary
transient
client
A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?
21
20
110
53
80
80
A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?
The remote repository of applications and dependencies will be updated to the latest version.
A specific application named upgrade will be installed.
Operating system updates are downloaded and will be installed.
Every application installed will update itself to the latest version.
Operating system updates are downloaded and will be installed.
Why would a rootkit be used by a hacker?
to reverse engineer binary files
to do reconnaissance
to try to guess a password
to gain access to a device without being detected
to gain access to a device without being detected
Match the commonly used ports on a Linux server with the corresponding service