IS3440 CHAP 10 KERNEL SECURITY RISK MITIGATION Flashcards Preview

IS3440 LINUX SECURITY > IS3440 CHAP 10 KERNEL SECURITY RISK MITIGATION > Flashcards

Flashcards in IS3440 CHAP 10 KERNEL SECURITY RISK MITIGATION Deck (32)
Loading flashcards...
1
Q

___ in the context of computing, is reference to the type of CPU, such as i386 for 32-bit Intel and AMD systems.

A

Architecture

2
Q

___ is the context of the kernel, is an incorporated feature from a later kernel.

A

Backport

3
Q

___ is the name of the Ubuntu distribution released in April 2008 with long-term support.

A

Hardy Heron (8.04)

4
Q

___ is an IBM system that uses IBM Performance Optimization With Enhanced RISC (POWER) CPUs.

A

iSeries

5
Q

___ is a family of 64-bit CPUs developed by Intel. Red Hat has supported these CPUs through Red Hat Enterprise Linux 5, but will not continue support in later releases.

A

Itanium

6
Q

___ is the Linux kernel developer responsible for the release of stable kernels.

A

Kroah-Hartman, Greg

7
Q

___ is a framework for security support within the Linux kernel, associated with mandatory access control. Examples: SELinux and AppArmor.

A

(LSMs) Linux security modules

8
Q

___ is the name of the Ubuntu distribution released in April 2010 with long-term support.

A

Lucid Lynx (10.04)

9
Q

___ describes a network packet with modified headers.

A

Mangled

10
Q

___ is a packet with an impossible source or destination address. Example- a packet from the Internet with a source address of a private Internet Protocol (IP) address network would be one.

A

Martian packet

11
Q

___ is a Linux package that refers to other packages. Example: linux - image refers to the latest version of the generic kernel built for Ubuntu.

A

Meta package

12
Q

___ is a reference to a software interface that is similar to the underlying hardware. It may require a special kernel.

A

Paravirturalized

13
Q

___ is the IBM Reduced Instruction Set Computing (RISC) server and workstation product line designed for UNIX systems; some Red Hat Enterprise Linux releases are built for these.

A

pSeries

14
Q

___ is a Linux security module for mandatory access control; functionally similar to SELinux and AppArmor.

A

(SMACK) Simplified mandatory access control kernel

15
Q

___ is a reference to network transmissions with a false source address.

A

Spoofed

16
Q

___ is a reference to the kernel developed and released by the Linux Kernel Organization.

A

Stock kernel

17
Q

___ is a Linux security module for mandatory access control; functionally similar to SELinux and AppArmor.

A

TOMOYO

18
Q

___ is the developer of the first Linux kernel and is the current leader of Linux kernel developers.

A

Torvalds, Linus

19
Q

___ is a specialized kernel for virtual machine monitors that supports hardware-assisted virtualization on systems with suitably capable CPUs.

A

Xen kernel

20
Q
  1. Which of the following features is no longer associated with a separate kernel on many Linux distributions?
  2. Virtual machine hosts
  3. Xen
  4. SMP
  5. Servers
A

SMP

21
Q
  1. When an updated kernel is released with a security update, which of the following numbers in the kernel is changed?
  2. Major version
  3. Minor version
  4. Update version
  5. Patch number
A

Patch number

22
Q
  1. Which of the following commands can be used to unpack and uncompress a stock kernel in .tar.bz2 format?
  2. tar xzf
  3. tar xjf
  4. tar xbf
  5. tar xuf
A

tar xzf

23
Q
  1. The Web site associated with the Linux Kernel Organization is ___.
A

http://kernel.org/

24
Q
  1. Which of the following actions should you NOT take when implementing a new kernel?
  2. Upgrade
  3. Install
  4. Patch
  5. Compile
A

Upgrade

25
Q
  1. which of the following directories contain a file with the configuration of the kernel that is currently running on the local system?
  2. /usr/src/redhat/BUILD/kernel-‘uname -r’/linux- ‘uname -r’/
  3. /usr/src/linux-‘uname -r’/configs/
  4. /usr/src/linux-‘uname r’/
  5. /boot/
A

/boot/

26
Q
  1. Which of the following commands starts a console-based menu-driven tool for customizing the kernel?
  2. make config
  3. make menuconfig
  4. make xconfig
  5. make gconfig
A

make menuconfig

27
Q
  1. Which of the following kernel options is NOT related to mandatory access controls?
  2. SELinux
  3. TOMOYO
  4. Cryptographic API
  5. AppArmor
A

Cryptographic API

28
Q
  1. Name the section of the kernel configuration tool related to formats such as ext2 and ext3.
A

Filesystems

29
Q
  1. In what configuration file can you customize the filename of the compiled kernel?
  2. make
  3. config- ‘uname -r’
  4. .config
  5. Makefile
A

Makefile

30
Q
  1. When a new kernel is compiled and installed, what file should contain different stanzas to two different kernels available during the boot process? (Select two)
  2. /boot/grub/menu.lst
  3. /etc/bootloader
  4. /etc/lilo.conf
  5. /usr/src/linux-‘uname -r’/.config
A

/boot/grub/menu.lst

/etc/lilo.conf

31
Q
  1. If you see the
    net.ipv4.icmp_echo_ignore_broadcasts = 1
    options in the /etc/sysctl.conf file, what file contains that boolean option?
  2. /proc/net/ipv4icmp_echo_ignore-braodcasts
  3. /proc/sys/sys/net/ipv4/icmp_echo_ignore_broadcasts
  4. /proc/net/sys/ipv4/icmp_echo_ignore_broadcasts
  5. ?proc/icmp_echo_ignore_braodcasts
A

/proc/sys/sys/net/ipv4/icmp_echo_ignore_broadcasts

32
Q
  1. Which of the following directives in the /etc/sysctl.conf should be set to 0 to deactivate routing on the local system?
  2. net.ipv4.ip_forward
  3. net.sys.ipv4.ip_route
  4. net.ipv4.ip_routing
  5. net.sys.ipv4.ip_source
A

net.ipv4.ip_forward