Module 4 - Linux Overview Flashcards

1
Q

Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?

intrusion detection system
malware analysis
PenTesting
firewall

A

PenTesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a benefit of Linux being an open source operating system?

Linux distribution source code can be modified and then recompiled.
Linux distributions are maintained by a single organization.
Linux distributions must include free support without cost.
Linux distributions are simpler operating systems since they are not designed to be connected to a network.

A

Linux distribution source code can be modified and then recompiled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which method can be used to harden a device?

Allow USB auto-detection.
Force periodic password changes.
Allow users to re-use old passwords.
Allow default services to remain enabled.

A

Force periodic password changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this command?

to list the processes currently running in the system
to display the contents of the current directory
to process a new task
to change file permissions

A

to list the processes currently running in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which operating system source code can be downloaded and modified by any person or company?

Cisco IOS
Mac OS X
Linux
Windows

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which file system is the primary file system used by Apple in current Macintosh computers?

CDFS
APFS
ext3
ext2
HFS+

A

APFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

read, write, execute
read only
read, write
full access

A

read, write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?

crontab
man
grep
cat

A

man

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a daemon?

a type of security attack
a background process that runs without the need for user interaction
a record to keep track of important events
an application that monitors and analyzes suspicious activity

A

a background process that runs without the need for user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Linux command can be used to display the name of the current working directory?

sudo
pwd
chmod
ps

A

pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

client
secondary
server
primary
transient

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?

21
20
110
53
80

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?

The remote repository of applications and dependencies will be updated to the latest version.
A specific application named upgrade will be installed.
Operating system updates are downloaded and will be installed.
Every application installed will update itself to the latest version.

A

Operating system updates are downloaded and will be installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why would a rootkit be used by a hacker?

to reverse engineer binary files
to do reconnaissance
to try to guess a password
to gain access to a device without being detected

A

to gain access to a device without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Match the commonly used ports on a Linux server with the corresponding service

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the Linux shell, which character is used between two commands to instruct the shell to combine and execute these two commands in sequence?

$
#
%
|

A

|

17
Q

What is the outcome when a Linux administrator enters the man man command?

The man man command configures the network interface with a manual address
The man man command opens the most recent log file
The man man command provides a list of commands available at the current prompt
The man man command provides documentation about the man command

A

The man man command provides documentation about the man command