IS3440 CHAP 3 BASIC SECURITY: FACILITIES THROUGH THE BOOT PROCESS Flashcards

1
Q

___ is the main configuration file for GUB version 1, AKA traditional GRUB.

A

COMMAND /boot/grub.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is the mount configuration file for Linux filesystems.

A

COMMAND /etc/fstab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is the main configuration file for the Linux Loader (LILO).

A

COMMAND /etc/lilo.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is the configuration file that associates Internet services with Transmission Control Protocol/Internet Protocol (TCP/IP) port numbers and protocols.

A

COMMAND /etc/services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is the Linux package with management tools for the (COMMAND) trousers package, associated with the Trusted Computing Software Stack and the TPM chip.

A

COMMAND tpm-tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is the Linux package associated with the Trusted Computing Software Stack, in support of the TPM chip.

A

COMMAND/ trousers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___is an interface often embedded in the motherboard. In some cases, it may be configured to allow remote access to the system boot menus.

A

(BMC) Baseboard management controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is the identification controls based on uniqued characteristics of authorized personnel. It may be used for authentication to access a secure location such as a server room.

A

Biometric controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is a sequence of programs that may be verified by the TPM. Example of this is Trusted GRUB.

A

Chain of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a self-described “donor-funded nonprofit” created to protect the digital rights of consumers.

A

(EFF) Electronic Frontier Foundation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is the organization behind the GNU project.

A

(FSF) Free Software Foundation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a newer version of the Grand Unified Bootloader, not yet in use on many Linux distributions.

A

GRUB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a one-way function that converts a large amount of data to a single (long) number in an irreversible manner.

A

Hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is a Linux security module developed by IBM to check the integrity of executable files before the are loaded during the boot process.

A

(IMA) Integrity Measurement Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is a nonprofit organization that sponsors Linux certification exams.

A

(LPI) Linux Professional Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a cryptographic hash function with a 128-bit value. It is also used to encrypt local Linux passwords in the (COMMAND FILE) /etc/shadow.

A

(MD5) Message Digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___is a consortium of security professionals and organizations sponsored by the European Union. ISECOM is working through ___ to modify standards for the TPM chip.

A

(OPEN TC) Open Trusted Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

___is a feature requested ty the EFF for inclusion in TPM chips that would enable fine-grained control over its use.

A

Owner override

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ is a feature of a network card and a BIOS/UEFI system that gives a system the ability to boot an operating system from a remote location.

A

(PXE) Pre-boot eXecution Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Colloquially known as a sniffer, a ___ can listen in on messages transmitted on a network. One Linux example is Wireshark.

A

Protocol analyzer

21
Q

___ is part of a Trusted Computing concept, known as the roots of trust. The core may reside in the first boot program, the BIOS or UEFI.

A

(RTM) Root Trust for Measurement

22
Q

___ is part of a Trusted Computing concept, known as the roots of trust. It reports on the integrity of a software component using SHA-1 keys.

A

(RTR) Root Trust for Reporting

23
Q

___ is part of a Trusted Computing concept, known as the roots of trust. It uses an endorsement key created by the TPM to store data implicitly trusted by the operating system.

A

(RTS) Root Trust for Storage

24
Q

___ is a set of cryptographic functions created by the US National Security Agency (NSA). Because of a weakness in it, the NIST has sponsored a competition for the development of this algorithm.

A

(SHA-1) Secure Hash Algorithm 1

25
Q

___ is a set of cryptographic functions being developed through a competition sponsored by NIST.

A

(SHA-3) Secure Has Algorithm 3

26
Q

___ is a Web-based software development site.

A

SourceForge

27
Q

___ is the President of the Free Software Foundation (FSF), the organization behind the GNU project. It is the leading opponent of the TPM chip.

A

Stallman, Richard

28
Q

___ is a key used to encrypt keys stored outside the TPM chip.

A

(SRK) Storage Root Key

29
Q

___ is an open source software stack of programs designed to work with the TPM chip. It may be downloaded and installed as the (COMMAND package) trousers .

A

TCG Software Stack

30
Q

___ is a chip that may be installed on hardware such as a motherboard. It may be used for password protection, software license protection, digital rights management, and disk encryption.

A

(TPM) Trusted Platform Module

31
Q

___ is a specialized version of GRUB that can work with the TPM chip in a chain of trust.

A

TrustedGRUB

32
Q

___ is a paravirtualized device in a hardware-virtualized machine, designed for faster virtual hard drives.

A

Virtio block device

33
Q

___Is the operating system installed inside a host’s virtual machine software.

A

Virtual guest

34
Q

___ is the operating system that hosts virtual machine software.

A

Virtual host

35
Q

___ is a protocol analyzer and previously know as Ethereal.

A

Wireshark

36
Q
  1. Which of the following hardware components is NOT used to boot a Linux system?
  2. A PXE-enabled network card
  3. A USB port
  4. A CD drive
  5. An Ethernet port
A

An Ethernet port

37
Q
  1. From the following answers, what is NOT addressed by a TPM chip?
  2. DRM
  3. Disk encryption
  4. KVM virtual machines
  5. Chain of trust
A

KVM virtual machines

38
Q
  1. Which of the following roots of trust is associated with the BIOS/UEFI?
  2. The Root of Trust Reporting
  3. The Root of Trust Storage
  4. The Root of Trust Management
  5. The Root of Trust Networking
A

.The Root of Trust Networking

39
Q
  1. Which of the following packages implements TPM support on Linux (Select two COMMANDS)
  2. tpm-tools
  3. tpm-drm
  4. trousers
  5. tcg
A

tpm-tools

trousers

40
Q
  1. Name the Linux service associated with virtual application support.
  2. KVM
  3. WINE
  4. VMware Player
  5. Xen
A

WINE

41
Q
  1. Which of the following directives in a LILO configuration file specifies the time before the default operating system is booted?
  2. delay
  3. timeout
  4. default
  5. period
A

delay

42
Q
  1. The COMMAND that can be used to set up an encrypted password for a traditional GRUB configuration file is ___.
A

(COMMAND)

grub-md5-crypt

43
Q
  1. From the following COMMANDS, which one updates the GRUB 2.0 configuration file read by the boot loader?
  2. grub-setup
  3. grub-mkconfig
  4. grub-install
  5. grub-set-default
A

grub-mkconfig

44
Q
  1. In a TrustedGRUB configuration file, which of the following directives refers to the first partition on the second hard drive?
  2. root (hd1.2)
  3. root (hd2,1)
  4. root (hd1,1)
  5. root (hd0,2)
A

root (hd1.2)

45
Q
  1. Which of the following kernel types is most likely to address the most RAM?
  2. Desktop
  3. Server
  4. Virtual machine
  5. Generic
A

Server

46
Q
  1. Which of the following kernel types is most likely to work with the smallest amount of RAM?
  2. Desktop
  3. Server
  4. Virtual machine
  5. Generic
A

Virtual machine

47
Q
  1. The GRUB 2.0 menu is hidden during the boot process. Which of the following keys, when pressed at the appropriate time, reveals the menu?
  2. Alt
  3. Shift
  4. Del
  5. Ctrl
A

Shift

48
Q
  1. Which of the following options can be substituted for a partition device in the (COMMAND) /etc /fstab configuration file? (Select two COMMANDS).
  2. sysfs
  3. LABEL
  4. /proc
  5. UUID
A

LABEL

UUID

49
Q
  1. Which of the following concepts is NOT one of the five OSSTMM process controls?
  2. Privacy
  3. Alarm
  4. Authenticity
  5. Integrity
A

Authenticity