IS3440 CHAP 7 NETWORKS, FIREWALLS, AND MORE Flashcards Preview

IS3440 LINUX SECURITY > IS3440 CHAP 7 NETWORKS, FIREWALLS, AND MORE > Flashcards

Flashcards in IS3440 CHAP 7 NETWORKS, FIREWALLS, AND MORE Deck (38):
1

(COMMAND) ___ lists the configured profiles of various commands and services.

(COMMAND) apparmor_status

2

(COMMAND) ___ is a service for running administrative jobs on a one-time basis; protected by the /etc/at.allow and /etc/at.deny files.

(COMMAND) at

3

(COMMAND) ___ is a SELinux command that can be used to change the AVC contexts associated with a file.

(COMMAND) chcon

4

(COMMAND) ___ is a service for running administrative jobs on a regular basis; protected by the /etc/cron.allow and /etc/cron.deny files.

(COMMAND) cron

5

(COMMAND) ___ is a SELinux command that returns the context settings of a specified file or directory.

(COMMAND) secon

6

(COMMAND) ___ Is a SELinux command that returns the overall status of SELinux on the local system.

(COMMAND) sestatus

7

___ in security, is an access permission represented by a bitmap; commonly stored for SELinux security in an ___ ___ cache.

Access vector

8

___ is an access permission associated with SELinux.

(AVC) Access vector cache

9

___ is a mandatory access control system used to create security profiles for different programs. Uses Linux security modules in the kernel. Not compatible with SELinux.

(AppArmor) Application Armor

10

___ is a protocol for validating users before allowing access, which includes a challenge to verify the identity of a user.

(CHAP) Challenge-Handshake Authentication Protocol

11

___ Is an attack based on overloading a network service, denying access to regular users. Not all are malicious, as they can be accidental results of certain types of connection attempts. Nevertheless, they should be blocked or slowed down as if they were attacks.

(DoS) Denial of service attack

12

___ is a professional organization; it is also the group behind standards such as 802.11 for wireless communication.

(IEEE) Institute of Electrical and Electronics Engineers

13

___ is a group of standards for digital transmission of voice and data over the public switched telephone network.

(ISDN) Integrated Services digital Network

14

___ is the organization responsible for domain names, IP addresses, and Transmission Control Protocol/Internet Protocol (TCP/IP) protocols on the internet.

(IANA) Internet Assigned Numbers Authority

15

___ supports atuomated Internet Protocol (IP) addressing without a Dynamic Host Configuration Protocol (DHCP) server. Related to Microsoft's automatic private IP addressing and Apple's Bonjour protocols. Communicates using both TCP and UDP over port 5353.

(mDNS) Multicast Domain Name Service protocol

16

___ is a protocol for validating users before allowing access.

(PAP) Password Authentication Protocol

17

____ is a reference to the current digital telephone network.

(PSDN) Public switched data network

18

___ is a reference to the regular telephone for voice communications.

(PSTN) Public switched telephone network

19

___ is a system for remote user authentication, frequently used to authenticate connections over telephone modems.

(RADIUS) Remote Authentication Dial in User Service

20

___ is a mandatory access control system that uses Linux security modules in the kernel. Developed by the US National Security Agency. Not compatible with AppArmor.

(SELinux) Security Enhanced Linux

21

___ is an access control list system for services associated with the internet super servers. It also can protect services linked to the
libwrap.so.0 library.

TCP Wrappers

22

___ is a modulator-demodulator for translating data bits into the sine waves associated with the PSTN. Cable ___ and DSL modems are not true modems, as they do not modulate or demodulate data.

Telephone modem

23

___ is a method for interpreting the emissions from computer displays to recover the associated image.

Van Eck phreaking

24

___ is software that can help detect unauthorized attacks on a wireless network; one example is available from the aircrack-ng package.

(WIDS) Wireless intrusion detection system

25

1. Well known TCP/IP ports range from ___ to ___.

0 to 1023

26

2. The (command) nmap checks for open ports on a remote system.
TRUE OR FALSE

TRUE

27

3. Which of the following configuration files is considered first with respect to TCP Wrapper security?

1. /etc/inetd.conf
2. /etc/xinetd.conf
3. /etc/hosts.allow
4. /etc/hosts.deny

/etc/hosts.allow

28

4. Which of the following library files is associated with TCP Wrappers?

1. /etc/libwrap/so/0
2. /lib/libwrap.so.0
3. /usr/lib/libwrap.so/0
4. /var/lib/libwrap.so.0

/lib/libwrap.so.0

29

5. Which of the following iptables command switches adds a rule to the middle of a chain?

1. -A
2. -I
3. -L
4. -C

-I

30

6. Which of the following actions is NOT used with the -j switch for the iptables command?

1. DROP
2. REJECT
3. LOG
4. FORWARD

FORWARD

31

7. The iptables command switch associated with a destination port is ___.

--dport

32

8. The PSDN network is associated with regular telephone modems.
TRUE OR FALSE

FALSE

33

9. Which of these files must exist for regular users to access the a t daemon?

1. /etc/a t
2. /etc/a t.deny
3. /etc/a t.conf
4. /etc/a t.a t.deny

/etc/a t.deny

34

10. which of the following IEEE protocols is most closely associated with wireless networking?
1. 802.3
2. 802.5
3. 802.11
4. 802.15

802.11

35

11. Which of the following commands lists the SELinux characteristics of a file?

1. ls filename
2. ls -SE filename
3. ls -l filename
4. ls -Z filename

s -Z filename

36

12. Which of the following commands can be used to customize the SELinux characteristics of a file?

1. fixfiles
2. chcon
3. restorecon
4. secon

chcon

37

13. To start the SELinux Troubleshooter in a GUI, run the following command: _____.

sealert -b

38

14. Which of the following directories include active AppArmor profiles?

1. /etc/apparmor/
2. /etc/apparmor.d/
3. /use/share/doc/apparmor-profiles/extras/
4. /usr/share/doc/apparmor-profiles/

/etc/apparmor.d/