Module 4 Flashcards

1
Q

What is Source code?

A

Source code: Programming code in text format compiled into software you can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does closed source mean?

A

Closed source: Describes software that gives the end user little to no access to the source code and limited freedom to change and implement that software based on a very restrictive license compared to open-source licenses. Examples: Microsoft, UNIX, IBM z/OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Linux Kernel?

A

Linux kernel: A foundational Linux component responsible for the low-level interface between an operating system and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Bootloader?

A

Bootloader: Code run by a computer after it starts. The bootloader can then be pointed to the Linux kernel on storage/disk to start the Linux kernel (i.e., bootstrapping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are drivers?

A

Drivers: Software that makes computer devices available for use by applications. File system drivers “present” the filesystem to applications that save files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the network do?

A

Network: Allows applications to communicate from a computer to other computers over wired (Ethernet) and wireless networks (IEEE 802.11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Linux Security Modules do? (LSM)

A

Linux Security Modules (LSM): Primarily designed as enhanced access control
mechanisms called mandatory access control (MAC); including AppArmor, SELinux, Smack, and TOMOYO. Do not confuse this MAC with the layer 2 media access control addresses in Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Processes, instances, and threads?

A

Processes, instances, and threads: Hardware resources and “time” to run (i.e., an instance) allocated by an operating system when code is run. This process can perform multiple activities, which are known as threads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are sessions?

A

Sessions: Consists of a group of processes. When users log in, applications and services
(known as daemons) are instantiated and grouped into process groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does tty, pty: Teletype and pseudo-teletype mean?

A

tty, pty: Teletype and pseudo-teletype; terminal types used for interactive CLI and GUI applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Service (daemon)?

A

Service (daemon): A process that involves no interaction with a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Applications?

A

Applications: Any process that the user can interact with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a password?

A

Password: A series of characters known by a user and used in conjunction with user
accounts to ensure a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a login prompt?

A

Login prompt: Triggers applications and services (daemons) to instantiate and group into process groups when a user logs in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Command-line interface (CLI)?

A

Command-line interface (CLI): A user interface that allows for typing commands within a Linux system; starts on bootup or launches from the graphical user interface (GUI) via the terminal emulator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Graphical user interface?

A

Graphical user interface (GUI): A user interface that provides interaction with a windowed environment to launch applications with a pointing device (e.g., a mouse); generally starts on
bootup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a GNU Core Utilities (coreutils)

A

GNU Core Utilities (coreutils): A foundational Linux component that provides common
commands integrated with the command-line interface (CLI). The coreutils package contains many common commands that include but are not limited to ls, mv, cp, touch, cat, and pwd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a X server?

A

X server: A foundational Linux distro component that provides a graphical user interface
(GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Package Management?

A

Package management: A foundational component that provides software and service installation, updates, and removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Client mean in regards to Lenux or networking?

A

Client: Requests resources or services from a server

21
Q

What does a Server do?

A

Server: Provides resources or services for a client

22
Q

How do computers use protocols?

A

Protocols: Used by computer systems to agree on how to communicate with one another over a network

23
Q

What are Vulnerabilities?

A

Vulnerabilities: Weakness in software or a system

24
Q

What are threats?

A

Threats: Actor that seeks to exploit vulnerabilities

25
Q

What are exploits?

A

Exploits: An action taken by an actor to compromise a system by using vulnerabilities

26
Q

what is ransomware?

A

Ransomware: Malware used to deprive organizations of access to their information until they pay a ransom

27
Q

What is a bot?

A

Bot: A system infected by malware that allows for remote command and control (C&C) of the infected systems

28
Q

What does C&C mean?

A

C&C: Command and control or C2; refers to systems that control already infected systems (bots) to launch various attacks (e.g., a DDoS or a coin-mining operation)

29
Q

How does a worm work and what is it?

A

Worms: Malware that propagates by detecting other systems on a network with specific vulnerabilities and then by replicating its code on the system to exploit those vulnerabilities

30
Q

What does DDoS stand for and what does it do?

A

Distributed Denial of Service (DDoS): An attack that uses C&C and bots to send traffic to systems that overwhelm those systems

31
Q

What is Kali Linux?

A

Kali Linux: A popular Linux distro that includes many useful security tools

32
Q

What is Endpoint Security?

A

Endpoint security: Security controls installed on endpoint systems, such as computers

33
Q

What is Anti-Malware?

A

Anti-Malware: Software or tools designed to detect, prevent, and remove malicious
software (malware) from computer systems, protecting them from cyber threats such as
viruses, ransomware, and spyware

34
Q

What is ClamAV?

A

ClamAV: A toolkit and malware detection engine that can quickly scan files

35
Q

How does a firewall work?

A

Firewall: A system or device that has configurable rules that protect systems from other hosts on the network

36
Q

What are iptables?

A

iptables: A firewall software package for Linux systems

37
Q

What doe DDoS mitigation mean?

A

DDoS mitigation: The people, processes, and technology involved in thwarting a DDoS attack

38
Q

What is ClamAV ?

A

ClamAV is an open source (GPLv2) anti-virus toolkit, designed especially for e-mail scanning on mail gateways. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. The core of the package is an anti-virus engine available in a form of shared library.

Tip: ClamAV is not a traditional anti-virus or endpoint security suite. For a fully featured modern endpoint security suite, check out Cisco Secure Endpoint.

ClamAV is brought to you by Cisco Systems, Inc.

39
Q

what is hardening?

A

Hardening: An all-encompassing term that describes tools, controls, and processes used to increase infrastructure security

40
Q

What is user configuration?

A

User configuration: Proper password rules and user setup, which are critical to server
security and required in modern server software

41
Q

What are business requirements in regards to security?

A

Business requirements: The processes, assets, people, and practices that are necessary for a business to operate and that must be considered when assessing security updates

42
Q

What is over hardening?

A

“Over hardening”: Occurs when the application of security controls impacts the ability of users to work on a system (i.e., availability is impacted)

43
Q

What is under hardening?

A

“Under hardening”: Occurs when there are insufficient security controls in place to address risks identified in the risk management process

44
Q

What is access control?

A

Access control: A security control that endeavors to limit access to individuals who need permission to obtain specific information

45
Q

What is baselining?

A

Baselining: A standard set of security configurations applied to a set of similar systems in an organization

46
Q

What are security controls?

A

Security controls: Any administrative, technological, or physical controls used to implement proper security

47
Q

What is a host firewall?

A

Host firewall: A generic term for a firewall installed on a host system. Example:
iptables/nftables

48
Q

What is patching?

A

Patching: Software updates that remediate security vulnerabilities