Introduction To Linux Flashcards

1
Q

What does Unix refer to?

A

Linux and “Linux-like” operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are Linux systems the most common target for attackers

A

96.3% of the top one million web servers are running Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is FOSS

A

Free Open Source Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Distribution (Distro)

A

Special-purpose variants of the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is the Ubuntu distro geared towards

A

General-purpose users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who is the Kali Linux distro geared towards

A

Specifically designed for security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command-line only machines are called

A

Headless servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which distro is best suited for a Central Data Server

A

Fedora and CentOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which distro is best suited for a Public Web Server

A

Ubuntu and Fedora

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which distro is best suited for an IT Audit Workstation

A

Kali Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which distro is best suited for a User Workstation

A

Ubuntu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SELinux

A

SELinux has a built-in file permission security enhancement developed by the NSA
CentOS and Fedora have it implemented by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which version of Ubuntu Servers do you choose if you are looking for a version that will remain stable over time?

A

LTS version
‘Long Term Support’s
The LTS version will remain stable and only change appropriately once a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Linux directory that contains every other folder

A

/ (root)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the directory that contains the user’s private files

A

/home
(Users should not be able to save files elsewhere)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What directory contains configuration files

A

/etc (pronounced ‘etsy’)
Configuration files, define how a machine runs and who can use it

17
Q

Which directory contains main Binary or Program files?

A

/bin and /sbin

Bin for user programs
Sbin for admin programs

18
Q

What directory contains files that change over time

19
Q

Which directory contains files that are only needed for a short period of time

20
Q

What is a Process

A

A running program is called a process
When a program runs, it must process data and potentially make changes to the file system. This is why a running program is called a process
When these programs process, save and modify data, they consume a computer’s resources.

21
Q

What is Memory

A

The space used by a process to save and manipulate data

22
Q

What 2 forms does memory come in?

A

1) RAM (Random Access Memory) : Used to run the program’s code. RAM is only used while the program is running.
The more work a process does, the more RAM it needs.

2) Disk Space: used to save data permanently
Files saved to a disk persist even after a process ends

23
Q

What is the role of the CPU?

A

The Central Processing Unit acts as the brain of the system, determining how much work a process has to do, and how difficult that work is.

24
Q

What is a DoS attack doing?

A

Denial of Service Attacks - attackers perform a DoS attack by launching processes that eat up memory on a target machine.
This can slow down or crash the machine, making it unavailable to the users, thus denying them service

25
Command to see all running processes in real time?
top (Table of processes) While in top u(filter mode by username or PID) P (sort by CPU usage) M (sort by MEM usage) z (Add cool visual colours) x (Highlight column you are currently sorting by)
26
How do you take a snapshot of all the running process on the system
ps command (Different arguments allow you to show different subsets of processes and use this output with other commands)
27
Command to Stop a Process
kill (Used to stop a process, usually ones causing problems. kill attempts to allow a process to finish before it shuts it down)
28
What is Dynamic Analysis
The process of running a potentially malicious script and monitoring it's effects.
29
What are PPAs
Repositories specifically used to store and distribute packages are known as Personal Package Archives or PPAs