Part1 Flashcards

1
Q

What is a Virtual Machine (VM)?

A

A software emulation of a physical computer, allowing you to run an operating system within another OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is VirtualBox?

A

An open-source hypervisor for creating and managing virtual machines on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Debian?

A

A popular, stable, and free Linux-based operating system used in this tutorial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an ISO File?

A

An image file containing the complete contents of a CD or DVD, used here to install Debian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Netinst ISO?

A

A minimal Debian installation image that downloads packages during installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Host Name?

A

The unique name assigned to a computer on a network; in this tutorial, it’s your login with ‘42’ appended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Root User?

A

The administrative user in Unix/Linux systems with full system access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Sudo?

A

A command that allows permitted users to execute commands as the superuser or another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Usermod Command?

A

A Linux command used to modify user account properties, such as adding a user to the sudo group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Visudo?

A

A command to safely edit the sudoers file, which defines user permissions for sudo.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SSH (Secure Shell)?

A

A protocol for securely accessing and managing remote computers over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is OpenSSH Server?

A

A suite of secure networking utilities based on the SSH protocol, providing encrypted communication sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the SSHD Config File?

A

The configuration file for the SSH daemon, where settings like the listening port are defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Port 4242?

A

The custom port number configured for SSH access in this tutorial, replacing the default port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is UFW (Uncomplicated Firewall)?

A

A user-friendly interface to manage firewall rules in Linux systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the UFW Enable Command do?

A

Activates the UFW firewall to start enforcing rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the UFW Allow Command do?

A

Adds a rule to UFW to permit traffic on a specified port, such as ‘sudo ufw allow 4242’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Port Forwarding?

A

A networking technique that redirects communication requests from one address and port number to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Crontab?

A

A file containing scheduled tasks (cron jobs) to run at specified times on Unix/Linux systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Cron Job?

A

A scheduled task in Unix/Linux systems that runs automatically at defined intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is LVM (Logical Volume Manager)?

A

A system for managing disk storage space, allowing flexible disk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Partitioning?

A

The process of dividing a hard disk into separate sections, each acting as an independent disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Encrypted LVM?

A

Combines LVM with disk encryption to secure data on logical volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is APT (Advanced Package Tool)?

A

A package management system used by Debian-based distributions to handle software installation and removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does the APT-Get Update Command do?
Fetches the latest package lists from repositories, ensuring the system knows about available updates.
26
What does the APT-Get Upgrade Command do?
Installs the newest versions of all installed packages currently on the system.
27
What is Git?
A distributed version control system for tracking changes in source code during software development.
28
What is the Git Installation Command?
‘sudo apt-get install git -y’ installs Git on a Debian-based system.
29
How do you check the Git Version?
‘git –version’ displays the currently installed version of Git.
30
What is Vim?
A highly configurable text editor built to enable efficient text editing.
31
What is the Vim Installation Command?
‘sudo apt-get install vim -y’ installs Vim on a Debian-based system.
32
What is Systemctl?
A command-line utility to examine and control the systemd system and service manager.
33
What does the Systemctl Status Command do?
‘sudo systemctl status ssh’ checks the current status of the SSH service.
34
What is the Service Command?
A command to run a System V init script, such as ‘sudo service ssh restart’ to restart the SSH service.
35
What does the Lsblk Command do?
Lists information about all available or specified block devices, useful for viewing disk partitions.
36
What does the Hostname Command do?
Displays or sets the system’s hostname.
37
What is the Sudoers File?
A configuration file that determines which users have administrative privileges.
38
What is an SSH Key Pair?
A pair of cryptographic keys used for secure SSH authentication, consisting of a private and a public key.
39
What is the SSH Config File?
A file that allows users to create shortcuts for SSH connections by specifying options for each host.
40
What is a Firewall?
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
41
What is the SSH Daemon (sshd)?
The server-side component of SSH that listens for and accepts incoming SSH connections.
42
What is an SSH Client?
The program used to connect to an SSH server, initiating the secure connection.
43
What is SSH Port Configuration?
Changing the default SSH port improves security by reducing exposure to brute force attacks. For example, editing /etc/ssh/sshd_config to set Port 4242.
44
What are Password Policies?
Enforcing strong password rules using PAM (Pluggable Authentication Modules) ensures security by requiring a minimum length, complexity, and expiration period for passwords.
45
What does the passwd Command do?
The passwd command is used to change a user’s password, such as sudo passwd username.
46
What is Password Expiration?
Setting expiration policies ensures users must update passwords regularly. Use commands like chage -M 30 username to set expiration to 30 days.
47
What are System Logs?
Logs stored in /var/log/ provide detailed information about system events, useful for debugging and security auditing.
48
What is Journalctl?
A command to view and query logs maintained by systemd. For example, journalctl -u ssh shows logs related to the SSH service.
49
What is Hardening SSH Access?
Disabling root login via SSH (PermitRootLogin no) and limiting allowed users in /etc/ssh/sshd_config strengthens security.
50
What is Dynamic DNS (DDNS)?
A service that automatically updates DNS records to match changing IP addresses, useful for remote server access.
51
What is the Filesystem Hierarchy Standard (FHS)?
The standard structure and directories used in Linux distributions, such as /home for user files and /var for logs.
52
What is Rootkit Detection?
Tools like rkhunter and chkrootkit scan systems for malicious rootkits. For example, install using sudo apt-get install rkhunter.
53
What are Service Configuration Files?
Found in /etc/, these files define the behavior and settings of installed services (e.g., /etc/ssh/sshd_config for SSH).
54
What is PAM Configuration?
PAM (Pluggable Authentication Modules) configurations, stored in /etc/pam.d/, control authentication policies.
55
What are Automated Backups?
Tools like rsync or cron scripts can be configured to back up important files regularly to remote servers or external drives.
56
What does the Alias Command do?
Creates shortcuts for commands. For example, alias ll='ls -la' provides a quick way to list all files with details.
57
What is Network Configuration?
Files like /etc/network/interfaces or tools like ip addr manage network settings in Debian.
58
What is Debian Package Management?
Packages are handled using dpkg and apt, enabling the installation, configuration, and removal of software.
59
What is Root Privilege Elevation?
Only authorized users listed in the sudo group can perform administrative tasks, enhancing security.
60
What is the GRUB Bootloader?
The GRUB bootloader, configured via /etc/default/grub, manages the system startup process.
61
What is Swap Space?
Virtual memory used when the system’s RAM is full. Configured during installation or added later using tools like fallocate.
62
What is Hardening Kernel Parameters?
Modify /etc/sysctl.conf to secure the kernel, such as disabling IP forwarding (net.ipv4.ip_forward = 0).
63
What is Fail2Ban?
A tool that blocks IP addresses after repeated failed login attempts. Install using sudo apt-get install fail2ban.
64
What is Service Restarting?
Use sudo systemctl restart service_name to restart services like SSH or UFW after configuration changes.
65
What is Disk Usage Monitoring?
Commands like df -h (disk usage) and du -sh /path (directory size) help monitor and manage storage.
66
What is Bash Scripting?
Writing scripts in Bash automates tasks, such as creating users, configuring SSH, or updating packages.
67
What are Essential Debian Commands?
Commands like apt-cache search, dpkg -l, and apt-mark hold are crucial for package management.
68
What is Network Troubleshooting?
Tools like ping, traceroute, and netstat help diagnose network issues and ensure connectivity.
69
How are Kernel Updates performed?
The Linux kernel is updated using apt-get dist-upgrade or manually compiling newer versions.
70
How do you create Users?
Use sudo adduser username to create new user accounts, followed by adding them to groups like sudo.