Chapter 10 Flashcards

1
Q

hacker

A

in the linux world this refers to intelligent linux users… not necessarily malicious individuals

525

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network server intermediaries

A

super server
super daemon

525

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

inetd

A

depreciated legacy super daemon.

525

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

inetd

Service Name

A

name of the service as listed in /etc/services file

526

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

inetd

Socket Type

A

tells the system what type of connection to expect like whether it is two way

526

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

inetd

Protocol

A

specifies which TCP/IP transport layer protocol will be used

526

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

inetd

Wait/No Wait

A

specifies whether the server connected to its client and freed the socket (nowait) or should process packets and then time out (wait)

526

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

inetd

User

A

username used to run the server. The root and nobody users were common choices

526

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

inetd

Parameters

A

Everything after the server name consisted of parameters that were passed to the server

526

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

xinetd

A

extended super daemon. It provides the functionality of inetd plus security options that are similar to those of TCP wrappers. controlled by the /etc/xinetd.d directory

528

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fuser

A

determines the processes currently using network port

537

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

su

A

switch user

typed alone results in a prompt for root password. if the user types the password correctly
544

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

repudiation environment

A

a user can deny actions.

545

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VNC

A

Virtual Network Computing

transfer’s data over the network unencrypted

555

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

who

A

shows you who is currently logged on to the system. It displays the username, their current terminal, and the time they logged into the system

547

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

who -a

A

adds far more information to the who command’s output

547

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

w command

A

shows who is logged into the system in addition to what they are doing and statistics about CPU usage

548

18
Q

last command

A

current and historical data concerning users logging into and out of the system

not quite the last card I will write for Linux, but close

548

19
Q

PAM

A

Pluggable Authentication Modules

called pam_limits. contains: domain type item value

551

20
Q

/etc/security/limits.conf

domain type item value

domain field

A

describes the entity to which the limit applies. It can be a username; a group name, which takes the form @groupname, or an asterisk wildcard, which matches everybody

551

21
Q

/etc/security/limits.conf

domain type item value

type field

A

specifies the limit as hard or soft. Hard limit is imposed by the system admin and cannot be exceeded under any circumstances

551

22
Q

/etc/security/limits.conf

domain type item value

Limited Item

A

specifies what type of item is being limited. Examples include core (size of the core files), data (the size of a program’s data area), fsize (the size of files created by the user), nofile (the number of open data files), rss (the resident set size), stack (stack size), cpu (cpu time of a single process in minutes), nproc (the number of concurrent processes), maxlogins (the number of simultaneous logins), and priority (the process priority)

552

23
Q

/etc/security/limits.conf

domain type item value

value field

A

specifies the value that’s to be applied to the limit

552

24
Q

ulimit syntax

A

ulimit [options [limit]]

552

25
Q

ulimit option

-c

A

core file limits the size of core dumps, which are files created for debugging purposes in certain types of program crashes

552

26
Q

ulimit option

-f

A

limits the size of files that may be created by the shell

552

27
Q

ulimit option

-n

A

limits the number of open file descriptors (not honored by most systems)

552

28
Q

ulimit option

-u

A

limits the number of processes a user may run

552

29
Q

ulimit option

-t

A

limits the total CPU time in seconds

552

30
Q

ulimit option

-v

A

sets the total amount of virtual memory available to the shell

552

31
Q

ulimit option

-s

A

sets the maximum stack size

552

32
Q

ulimit option

-m

A

sets the maximum resident set size

552

33
Q

ulimit option

-d

A

limits programs’ data set size

552

34
Q

ulimit option

-l

A

sets the maximum size that may be locked into memory

552

35
Q

ulimit option

-H

A

modifies only options to be hard

553

36
Q

ulimit option

-S

A

modifies only options to be soft

553

37
Q

ulimit option

-a

A

casues ulimit to report its current settings

553

38
Q

growing the haystack password technique

A

adding a single letter repeatedly to increase security

543

39
Q

GPG

A

Gnu Privacy Guard

not installed by default. open source reimplimentation of PGP

uses private and public key.
564

40
Q

where does GPG keep it’s keys?

A

keyring

in the ~/.gnupg

564

41
Q

pwconv

A

moves all password information from the /etc/passwd

541

42
Q

pwck

A

ensures all of the files are in sync after conversion

541`