IS3440 CHAP 5 FILESYSTEMS, VOLUMES, AND ENCRYPTION Flashcards Preview

IS3440 LINUX SECURITY > IS3440 CHAP 5 FILESYSTEMS, VOLUMES, AND ENCRYPTION > Flashcards

Flashcards in IS3440 CHAP 5 FILESYSTEMS, VOLUMES, AND ENCRYPTION Deck (55):
1

___ command is the group quota management file.

(COMMAND) aquota.group

2

___ command is the user quota management file.

(COMMAND) aquota.user

3

___ command assigns a new group owner to a file.

(COMMAND) chgrp

4

___ command modifies permissions to a file.

(COMMAND) chmod

5

___ command assigns a new user owner to a file

(COMMAND) chown

6

___ command is associated with the enterprise cryptographic filesystem.

(COMMAND) ecryptfs

7

___ command to check and edit user quotas.

(COMMAND) edquota

8

___ command is the Linux second extended filesystem.

(COMMAND) ext2

9

___ command is the Linux third extended filesystem; includes journaling.

(COMMAND) ext3

10

___ command is the Linux fourth extended filesystem; includes journaling and support for larger files.

(COMMAND) ext4

11

___ command is one Linux partition configuration tool.

(COMMAND) fdisk

12

___ command to review ACL settings for a file.

(COMMAND) getfac 1

13

___ command that can encrypt and add digital signatures to a file.

(COMMAND) gpg

14

___ command is the mount command option that sets user quotas; often found in
/ etc / fstab

(COMMAND) grpquota

15

___ Linux command to format and build a Linux filesystem. It is also a root for filesystem-specific commands such as (COMMAND) mkfs . ext3 and mkfs . risers, which set up a filesystem to the given format.

(COMMAND) mkfs

16

___ command is the default account for unauthorized users who connect to the NFS file-sharing server.

(COMMAND) nfsnobody

17

___ command is the default account for users on certain configured file-sharing servers.

(COMMAND) nobody

18

___ command creates, checks, and repairs quota management files such as (COMMAND) aquota . user and aquota . group.

(COMMAND) quotacheck

19

___ command is the Linux filesystem based on balanced trees, suited for groups of large and small files.

(COMMAND) reiserfs

20

By itself, ___ command is the name of the standard Linux administrative user. The top-level root directory is symbolized by the forward slash (/). In contrast, the home directory of the root user is /root, which is a subdirectory of the top-level root directory (/).

(COMMAND) root

21

___ command to create or modify ACL settings for a file.

(COMMAND) setfac 1

22

___ command is the main configuration file for the Samba/CIFS file server.

(COMMAND) smb.conf

23

___ command is the mount command option that sets user quotas; often found in / etc/fstab.

(COMMAND) usrquota

24

___ command is the main configuration file for the very secure FTP daemon service.

(COMMAND) vsftpd.conf

25

___ command is the Linux filestytem developed by Silicon Graphics suited to larger files.

(COMMAND) xfs

26

___ is an encryption standard configured by the National Institute of Standards and Technology (NIST).

(AES) Advanced Encryption Standard

27

___ is the system used to encrypt partitions and disks. Part of the device mapper and associated with the loadable (COMMAND) dm_crypt module.

Disk encryption subsystem

28

___ is anagram for Digital Signature Algorithm, originally used by the US government for digital signatures.

DSA

29

___ is a system adapted by Ubuntu to encrypt directories: uses the ecryptfs command.

(eCryptfs) enterprise cryptographic filesystem

30

___ is a probabilistic encryption scheme developed by There Elgamal (ElGamal).

Elgamal

31

___ is a protocol for organizing and storing files. Most require a format; typical formats include ext2, ext3, ext4, reiserfs and xfs commands.

Filesystem

32

___ is the way files and directories are organized in Linux. It includes a list of standard directories and the types of files normally stored in those directories.

(FHS) Filesystem hierarchy standard

33

___ isa data structure associated with a file.

Inode

34

___ refers to a filesystem that keeps track of changes to be written. Recovery tools can then use the journal to quickly find data on files to be written.

Journaled filesystem

35

___ refers to tools that depend on drivers and modules loaded with the Linux kernel.

Kernel-space

36

___ is a disk encryption specification that requires the (COMMAND) de_crypt module.

(LUKS) Linux unified key setup

37

___ is a public-key encryption algorithm, named for its developers, Rivest, Shamir, and Adleman.

RSA

38

___ is a set of cryptographic hash functions developed by the US National Security Agency.

(SHA) Secure hash algorithm

39

___ is a version of redundant array of independent disks that uses partitions instead of disks as components of the array.

Software RAID

40

___ refers to tools that do not depend on the Linux kernel.

User-space

41

1. Which of the following directories are suitable for separate filesystems? (Select two) The answer is stated in (COMMAND) FORM

1. /etc/
2. /home/
3. /lib/
4. /var/

/home/

/var/

42

2. Which of the following directories typically includes files associated with third-party applications? The answer is stated in (COMMAND) FORM

1. /etc/
2. /home/
3. /opt/
4. /use/

/opt/

43

3. Which of the following directories is most well suited as a read-only filesystem? The answer is stated in (COMMAND) FORM

1. /boot/
2. /home/
3. /mnt/
4. /srv/

/boot/

44

4. Which of the following filesystem formats is best suited for a smaller filesystem?

1. ext2
2. ext3
3. ext4
4. reiserfs

ext2

45

5. The command that lists currently loaded GPG keys is ___.

gpg --list-keys

46

6. Which of the following directories contain GPG private and public keys?

1. .gpg
2. .gpgkeys
3. .gnupg
4. .keys

.gnupg

47

7. Which of the following commands is associated with the Linux unifies key setup disk encryption specification?

1. dcrypt
2. ecryptfs
3. gpg
4. cryptsetup

cryptsetup

48

8. Which of the folioing commands prohibits access from all users except the user owner and members of the group that owns the file named (COMMAND) filename?

1. chmod 770 filename
2. chmod 707 filename
3. chmod 077 filename
4. chmod 007 filename

chmod 770 filename

49

9. Which of the following commands sets the SUID bit on the file named filename?

1. chmod 1770 filename
2. chmod 2750 filename
3. chmod 770 filename
4. chmod 3777 filename

chmod 770 filename

50

10. IF you try to change files remotely on a shared NFS directory as the root administrative user, what happens?

1. The change fails, because the root user on one system is the nobody user on another system.
2. The change is successful
3. The change is successful even if the NFS directory is shared in read-only mode.
4. The change fails unless you log in with the root administrative password from the remote system.

The change fails, because the root user on one system is the nobody user on another system.

51

11. Which of the following Samba directives specify permissions of files created a shared network directory.

1. create_octal
2. create_mask
3. create_options
4. create_write

create_mask

52

12. Which of the following directories is appropriate for quotas?

1. /etc/
2. /home/
3. /opt/
4. /usr/

/home/

53

13. Which of the following commands lists quota usage by user?

1. quota
2. repquota
3. quotacheck
4. quotarep

repquota

54

14. what configuration file is used to configure ACLs for a filesystem?

1. /etc/fstab
2. /etc/acl
3. /etc/pam.d/acl
4. /etc/filesystem

/etc/fstab

55

15. The command that lists the current ACL rules on the local file named test 1 is ___.
Assume your user account is the owner of file test1.

getfac1 test 1