Day 6: Linux Security Essentials Flashcards

1
Q

(T/F) Windows is loaded on over 80% of all computers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(T/F) Windows is the OS that most mission-critical systems run on.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(T/F) Most security appliances that are installed in a data center are running Linux

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a major breach and a minor breach?

A

It is not the system that is compromised, but the data it contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What OS do most appliances and security devices run?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(T/F) It is important to remember that although Windows has a much larger install base, Linux is usually installed on most important, mission critical systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What OS do security analysts, assessment and penetration testers and many security teams using?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(T/F) Linux started as a desktop OS, but has moved into the data center as a server.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main linux distributions?

A
  • Ubuntu (Debian)
  • Fedora (Red Hat)
  • Cygwin for Windows
  • Mac OS (BSD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What distribution is Kali based on?

A

Debian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Often just called Linux, what is the proper nominclature?

A

GNU/Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who ported Minix (a UNIX teaching tool) to Linux from scratch for the Intel 386 platform?

A

Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Ubuntu mean when translated back to it’s African word?

A

Humanity to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ubuntu is based on what branch of Linux?

A

Debian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What linux branch is best known for its package management system?

A

Debian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Debian package-management system called?

A

APT: Advanced Package Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does APT work?

A

APT researches the package in question, sees what libraries and other programs that the package might need (these are called dependencies), goes out to the Internet and downloads them, installs them, presents any configuration choices to the user, and Chen checks it work - all done automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Does Ubuntu come with a default firewall and a graphical control for the firewall ENABLED?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What Linux is Fedora based on?

A

RedHat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

With Fedora, is the firewall included and enabled?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the most profitable Linux version?

A

RedHat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With any OS is it critical to continually think about security and look at additional hardening measures?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the major steps to securing Mac OS?

A
  1. Turn on firewall to control access to the system.
  2. Turn off unneeded services
  3. Limit service sharing
  4. Set up securing file sharing
  5. Carefully monitor access lists
  6. Use password assistant for stronger authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Linux command to list contents of a directory?

A

ls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the Linux command to list contents of a directory including long listing and shows attributes?
ls -l
26
What is the Linux command to list contents of a directory including both hidden and regular files?
ls -al
27
What is the Linux command to change the working directory?
cd
28
What is the Linux command to rename a file?
mv
29
What is the Linux command to change file attributes?
chmod
30
What is the Linux command to make a new directory?
mkdir
31
What is the Linux command to remove a directory?
rmdir
32
What is the Linux command to delete files?
rm
33
What is the Linux command to copy files?
cp
34
What is the DOS command to list contents of a directory?
dir /w
35
What is the DOS command to list contents of a directory including both hidden and regular files?
dir
36
What is the DOS command to list contents of a directory including both hidden and regular files?
dir /a
37
What is the DOS command to change the working directory?
cd
38
What is the DOS command to rename a file?
rename
39
What is the DOS command to change file attributes?
attrib
40
What is the DOS command to make a new directory?
md
41
What is the DOS command to remove a directory?
rd
42
What is the DOS command to delete files?
del
43
What is the DOS command to copy files?
copy
44
What is the Linux command to view file contents?
cat
45
What is the Linux command to print the current working directory?
pwd
46
What is the Linux command to view a page at a time
more
47
What is the Linux command to read the help manual?
man
48
What is the Linux command to find specific files?
find
49
What is the Linux command to perform string searches?
grep
50
What is the Linux command to switch user accounts?
su
51
What is the Linux command to delegate authority to users?
sudo
52
What is the Linux character to pipe one command into another one?
|
53
How do you create a file as output from commands?
>
54
What is the Linux command-line interpreter used to run programs on the computer?
shell
55
In Linux, what provides the use with an interface to the system?
shell
56
In linux, what listens to the terminal and translates requests into action by the kernel and programs?
shell
57
In Linux, what is the vehicle through which applications obtain permissions and interact with the kernel?
shell
58
In Linux, what is the root file system?
/
59
In Linux, what is the top of the directory hierarchy?
/
60
What can you use to find the commands for each different Linux distributions?
Unix Rosetta Stone
61
In Linux, what directory contains files used to talk to system devices?
/dev | /devices
62
In Linux, what directory contains the primary OS?
/usr
63
How should you setup the /usr directory for security?
Mount it read-only
64
In Linux, what directory contains logs, queues, etc.?
/var
65
In Linux, what directories contain executable programs, some of which are SUID or SGID?
/bin /usr/bin /usr/local /opt
66
In Linux, what directories contain user home directories?
/home | /export/home
67
(T/F) There used to be a lot of variance about where different files were located in different Linux flavors, but modern Linux variants use the same general file system layout.
True
68
In Linux, what is the top of the file system?
/
69
In Linux, what directory contains the special device files that programs running on the system use to communicate with the physical hardware devices controlled by the kernel?
/dev
70
In Linux, where are the most critical components of the OS found - including system binaries, programming library and tools?
/usr
71
In Linux, what directory has the online documentation?
/usr
72
In Linux, what directory should be thought of as read-only after the OS is loaded until the system is upgraded or patched?
/usr
73
In Linux, what directory is the place where the system keeps frequently changing data, such as logs and temporary queues?
/var
74
In Linux, the standard convention is to put 3rd party software obtained from the Internet into what directory?
/usr/local
75
SYSV-derived systems such as Solaris and HP-UX often put 3rd-party software into which directory?
/opt
76
What are the Linux File System Security Goals?
1. Protect OS binaries in /usr 2. Prevent introduction of SUID programs and unauthorized devices 3. Allow other software to be installed 4. Discourage DoS attacks
77
After a system is compromised, the attacker likely wants to install a rootkit. Typically, the binaries that the attacker replaces are OS programs in which directory?
/usr/bin | /usr/sbin
78
What is called a set of binaries that gives an attacker a back door into the system and helps them escape detection by the system administrator?
Rootkit
79
(T/F) The administrator should not attempt to stop people from creating or bringing unauthorized set-UID and set-GID programs on the machine.
Falst
80
Administrators partition file systems to prevent what types of attacks?
Denial of Service (DoS)
81
What is the golden rule?
The best way to secure a service is to turn it off, and if it's not needed, uninstall it.
82
The phase "The best way to secure a service is to turn it off, and if it's not needed, uninstall it" is known as?
The golden rule
83
(T/F) Although many security mechanisms are built into Linux, there is no such thing as a secure Linux install.
True
84
Linux Classic init is also known as what style initialization?
System-V
85
In Linux, what is the original boot time service starter?
init
86
(T/F) In Linux, init does not follow a linear process.
false
87
(T/F) In Linux, init is able to detect and handle sudden changes in the system.
False
88
In Linux, when does init track services?
boot & shutdown
89
Does init in Linux System-V use runlevels ?
Yes
90
Using Classic init Linux, when the system is powered on and after the kernel if fully running, what is the first process to start?
init
91
In Classic init Linux, what is responsible for the setup of the entire user environment?
init
92
The init process starts as what process id (PID)?
1
93
In Classic Linux, what is the parent process to all other processes and adopts all orphaned processes in the user space?
init | PID 1
94
(T/F) init was created at a time when parallel processing and changes to a running system did not exists, put they are now commonplace.
True
95
(T/F) init is aware of changes made to the system while it is running.
False
96
When is the only time that init deals with services?
Startup and Shutdown