M3M4 Flashcards
(61 cards)
Why would a network administrator choose Linux as an operating system in the Security Operations Center (SOC)?
- It is easier to use than other operating systems.
- More network applications are created for this environment.
- It is more secure than other server operating systems.
- The administrator has more control over the operating system.
The administrator has more control over the operating system.
Explanation: There are several reasons why Linux is a good choice for the SOC.
Linux is open source.
The command line interface is a very powerful environment.
The user has more control over the operating system.
Linux allows for better network communication control.
Which two methods can be used to harden a computing device? (Choose two.)
- Allow default services to remain enabled.
- Allow USB auto-detection.
- Enforce the password history mechanism.
- Update patches on a strict annual basis irrespective of release date.
- Ensure physical security.
- Enforce the password history mechanism.
- Ensure physical security.
Explanation: The basic best practices for device hardening are as follows:
Ensure physical security.
Minimize installed packages.
Disable unused services.
Use SSH and disable the root account login over SSH.
Keep the system updated.
Disable USB auto-detection.
Enforce strong passwords.
Force periodic password changes.
Keep users from reusing old passwords.
Review logs regularly.
Which Linux command can be used to display the name of the current working directory?
- sudo
- ps
- pwd
- chmod
pwd
Explanation: One of the most important commands in Linux is the pwd command, which stands for print working directory. It shows users the physical path for the directory they are working in.
Consider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?
ls –l analyst.txt
-rwxrw-r– sales staff 1028 May 28 15:50 analyst.txt
- write only
- read, write
- read only
- read, write, execute
read, write, execute
Explanation: The file permissions are always displayed in the User Group and Other order. In the example displayed, the file has the following permissions:
The dash ( – ) means that this is a file. For directories, the first dash would replaced with a “d”.
The first set of characters is for user permission (rwx).
The user, sales, who owns the file can read, write and execute the file.
The second set of characters is for group permissions (rw-). The group, staff, who owns the file can read and write to the file.
The third set of characters is for any other user or group permissions (r–). Any other user or group on the computer can only read the file.
A Linux system boots into the GUI by default, so which application can a network administrator use in order to access the CLI environment?
- system viewer
- file viewer
- package management tool
- terminal emulator
terminal emulator
Explanation: A terminal emulator is an application program a user of Linux can use in order to access the CLI environment.
What is the well-known port address number used by DNS to serve requests?
- 25
- 53
- 110
- 60
port 53
Explanation: Port numbers are used in TCP and UDP communications to differentiate between the various services running on a device. The well-known port number used by DNS is port 53.
Which user can override file permissions on a Linux computer?
- any user that has ‘group’ permission to the file
- only the creator of the file
- any user that has ‘other’ permission to the file
- root user
root user
Explanation: A user has as much rights to a file as the file permissions allow. The only user that can override file permission on a Linux computer is the root user. Because the root user has the power to override file permissions, the root user can write to any file.
Match the commonly used ports on a Linux server with the corresponding service.
Port: 53
- SMTP
- DNS
- HTTPS
- SSH
- Telnet
DNS: 53
Match the commonly used ports on a Linux server with the corresponding service.
Port: 23
- SMTP
- DNS
- HTTPS
- SSH
- Telnet
TELNET: 23
Match the commonly used ports on a Linux server with the corresponding service.
Port: 25
- SMTP
- DNS
- HTTPS
- SSH
- Telnet
SMTP: 25
Match the commonly used ports on a Linux server with the corresponding service.
Port: 443
- SMTP
- DNS
- HTTPS
- SSH
- Telnet
HTTPS: 443
Match the commonly used ports on a Linux server with the corresponding service.
Port: 22
- SMTP
- DNS
- HTTPS
- SSH
- Telnet
SSH: 22
used by RedHat and CentOS computers and tracks authentication-related events
- /var/log/messages
- /var/log/auth.log
- /var/log/secure
- /var/log/dmesg
/var/log/secure
used by RedHat and CentOS computers and tracks authentication-related events: /var/log/secure
contains generic computer activity logs, and is used to store informational and noncritical system messages
- /var/log/messages
- /var/log/auth.log
- /var/log/secure
- /var/log/dmesg
/var/log/messages
used by RedHat and CentOS computers and tracks authentication-related events: /var/log/secure
stores information related to hardware devices and their drivers
- /var/log/messages
- /var/log/auth.log
- /var/log/secure
- /var/log/dmesg
/var/log/dmesg
stores information related to hardware devices and their drivers: /var/log/dmesg
used by Debian and Ubuntu computers and stores all authentication-related events
- /var/log/messages
- /var/log/auth.log
- /var/log/secure
- /var/log/dmesg
/var/log/auth.log
used by Debian and Ubuntu computers and stores all authentication-related events: /var/log/auth.log
Which type of tool allows administrators to observe and understand every detail of a network transaction?
- log manager
- malware analysis tool
- ticketing system
- packet capture software
packet capture software
Explanation: Network packet capture software is an important tool because it makes it possible to observe and understand the details of a network transaction.
Why is Kali Linux a popular choice in testing the network security of an organization?
- It is a network scanning tool that prioritizes security risks.
- It is an open source Linux security distribution containing many penetration tools.
- It can be used to test weaknesses by using only malicious software.
- It can be used to intercept and log network traffic.
It is an open source Linux security distribution containing many penetration tools.
Explanation: Kali is an open source Linux security distribution that is commonly used by IT professionals to test the security of networks.
Match the octal value to the file permission description in Linux.
Write only
- 000
- 001
- 010
- 101
- 110
write only ~~> 010
Match the octal value to the file permission description in Linux.
Read and execute
- 000
- 001
- 010
- 101
- 110
read and execute ~~> 101
Match the octal value to the file permission description in Linux.
Read and write
- 000
- 001
- 010
- 101
- 110
read and write ~~> 110
Match the octal value to the file permission description in Linux.
Execute only
- 000
- 001
- 010
- 101
- 110
execute only ~~> 001
Match the octal value to the file permission description in Linux.
No access
- 000
- 001
- 010
- 101
- 110
no access ~~> 000
Displays the name of the current working directory:
- chmod
- ps
- pwd
- sudo
Displays the name of the current working directory: pwd