Security Flashcards

1
Q

In an xinetd configuration file, which attribute specifies the network address that will be used to
provide the service?

A

bind, interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

A

I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

A

DISPLAY, $DISPLAY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

A

/etc/nologin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which configuration file would be edited to change the default options for outbound SSH sessions?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/client
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_client
A

/etc/ssh/ssh_config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?
A. tcpd
B. inetd
C. fingerd

A

tcpd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?
A. core
B. edquota
C. ulimit
D. quota
A

ulimit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?
A. debug
B. lsof
C. nessus
D. strace
E. traceroute
A

lsof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which configuration file would be edited to change default options for the OpenSSH server?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/server
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_server
A

/etc/ssh/sshd_config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which configuration file does sudo read when determining if a user is permitted to run applications
with root privileges?
A. /etc/security.conf
B. /etc/supasswd
C. /etc/sudoers
D. /etc/sudo.conf
A

/etc/sudoers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following commands can be used to associate open TCP ports with the processes that opened the ports?
A. ptrace
B. strace
C. debug
D. nessus
E. lsof
A

lsof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Instead of using specific host names or IP addresses, which string can be used in /etc/hosts.allow entries to cover any remote host no matter of its name or address? (Specify the relevant string only without any additional options or arguments.)

A

ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following resources can be directly limited for a given user using ulimit? (Choose THREE correct answers.)
A. Maximum seconds of CPU time spent.
B. Maximum number of open file descriptors.
C. Maximum number of processes available.
D. Maximum number of concurrent login sessions.
E. Maximum seconds of login duration per session

A

A. Maximum seconds of CPU time spent.
B. Maximum number of open file descriptors.
C. Maximum number of processes available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Depending on the host's configuration, which of the following files can be used to turn on and off network services running on a host? (Choose TWO correct answers.)
A. /etc/profile
B. /etc/services
C. /etc/inetd.conf
D. /etc/xinetd.conf
E. /etc/host.conf
A

C. /etc/inetd.conf

D. /etc/xinetd.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do shadow passwords improve the password security in comparison to standard passwd passwords?
C. The system’s host key is used to strongly encrypt all shadow passwords.
D. Shadow passwords are always combined with a public key that has to match the user’s private
key.
E. Regular users do not have access to the password hashes of shadow passwords.

A

Regular users do not have access to the password hashes of shadow passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is true regarding public and private SSH keys? (Choose TWO correct answers.)
A. Several different public keys may be generated for the same private key.
B. The private key must never be revealed to anyone.
C. For each user account, there is exactly one key pair that can be used to log into that account.
D. To maintain the private key’s confidentiality, the SSH key pair must be created by its owner.
E. To allow remote logins, the user’s private key must be copied to the remote server.

A

The private key must never be revealed to anyone

To maintain the private key’s confidentiality, the SSH key pair must be created by its owner

17
Q

Which command is used to add OpenSSH private keys to a running ssh-agent instance? (Specify the file name only without any path.)

A

ssh-add, /usr/bin/ssh-add

18
Q

Which of the following commands gets the GnuPG public key with the id 63B4835B from the
keyserver example.com?
A. gpg –keyserver hkp://example.com –recv-key 63B4835B
B. gpg –search-key hkp://63B4835B@example.com
C. gpg –keyserver gpg://example.com –get-key 63B4835B
D. gpg –keyserver hkp://example.com –add-key 63B4835B
E. gpg –keyserver gpg://example.com –key 63B4835B

A

gpg –keyserver hkp://example.com –recv-key 63B4835B