IT 352 Security Administration of Linux Systems Spring 2025 Final Exam Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/81

flashcard set

Earn XP

Description and Tags

Flashcards to assist students in reviewing the course content in preparation for the final exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

82 Terms

1
New cards

What is the Linux kernel?

The core of the Linux operating system, with other components added as modules.

2
New cards

Where are kernel log messages usually written?

A section of memory called the kernel ring buffer, viewed using the dmesg command.

3
New cards

How can configuration options be set for the kernel?

At boot time using parameters passed by the bootloader (e.g., GRUB) or by loading kernel modules dynamically at runtime.

4
New cards

Why is the uname command useful?

For displaying system information, including the Linux kernel version and operating system type.

5
New cards

How is a typical Linux system started, and what is the boot process?

By starting a service management process like init (older systems) or systemd (newer systems, especially Red Hat-style). systemd is the first process started.

6
New cards

Who builds a kernel?

Kernels are usually built and maintained by the maintainers of the distribution. A typical Linux administrator does not need to build the kernel.

7
New cards

Name some Linux commands commonly used for network management tasks.

iptables, firewalld, ufw, gufw, ping, and ssh.

8
New cards

What are common names for network interfaces in different versions of Linux?

Older systems used eth0, eth1, and lo. Modern systems use predictable names like enp0s3, ens33, or eno1.

9
New cards

What is a loopback network interface? Why is it useful?

A special interface (lo) used only for testing, internally connected to itself.

10
New cards

What does ping do? Why is it useful?

Uses ICMP to test connectivity by sending a message to another system and waiting for a response.

11
New cards

What systemctl command might you use to check if networking is currently running?

systemctl status networking

12
New cards

What is a potential problem if you stop networking?

You can no longer communicate over the network (ssh, web browsing, etc.).

13
New cards

Is a server typically using a static IP address or an address assigned by DHCP? Why?

Static IP address, to ensure the server is always at the same address.

14
New cards

Why is computer networking typically implemented as a stack of different layers?

To break communication into smaller, understandable pieces, following the divide-and-conquer idea.

15
New cards

Why is most Internet traffic carried over TCP, rather than UDP, at the Transport layer?

TCP provides reliability through session creation and error handling.

16
New cards

What is an ephemeral port number? Why is it used? What type of device would use it?

A port number ranging from 1024 to 65535, used to separate different connections or sessions, especially on the client side.

17
New cards

What is a network socket? What is a socket address?

A software endpoint of a network connection. A socket address is an IP address and a port number.

18
New cards

What is a private IP address? What is another name for it? Why is it used?

An IP address from a reserved range (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), also called a non-routable address, used for internal networks.

19
New cards

What is network address translation (NAT)? Why is it used?

A router-level technology that translates private socket addresses to public ones, allowing private networks to access the internet.

20
New cards

What is a DMZ in the networking context? Why is it used? What is typically in it?

A neutral subnetwork between a trusted internal network and the untrusted internet, typically containing public-facing servers.

21
New cards

In a typical "T configuration" firewall arrangement, which inter-zone forwarding should be allowed?

From the outside to the DMZ, from the DMZ to the outside, from the internal to the DMZ, and from the DMZ to the internal.

22
New cards

Can you name and briefly describe some common firewall applications or components in Linux?

netfilter, iptables, firewalld, ufw, and gufw.

23
New cards

What is a package in the Linux context?

A grouping of software components that belong together.

24
New cards

What does the wget command do?

A non-interactive network downloader that retrieves files from a URL.

25
New cards

What are some common package managers used in Linux?

Debian-style: dpkg, apt, aptitude, Synaptic. Red Hat-style: rpm, yum, dnf.

26
New cards

What are log files? Why are they used?

Text records maintaining a history of significant system events, important for tracking what has happened over time.

27
New cards

Why is rsyslog useful (compared to some simpler tool)?

rsyslog supports remote logging; If a host system fails, logs can still be reviewed from another system.

28
New cards

What is a service in the Linux admin context?

A process that runs constantly in the background, often without a console interface.

29
New cards

Can you give examples of commands used to manage services?

Debian-style: service [name] [option]. Red Hat-style: systemctl [option] [name].

30
New cards

What is the Web? Is it the same as the Internet? Explain.

The Web is an application that uses the Internet. The Internet is a network that carries packets of data for different application.

31
New cards

What is the client-server model? What is a Web client? What is a Web server?

A server is an unattended background process that listens for new connections. A client is user-controlled. A Web client is a browser. A web server is a software process lets Web clients interact with Web resources using HTTP or HTTPS.

32
New cards

What is HTML? What is HTTP?

HTML is a language used to mark up text. HTTP is a client-server application-layer protocol that typically sits on top of TCP.

33
New cards

Why are cookies needed in web browsing?

Since HTTP is stateless, cookies are used to maintain state, like when a user logs in or adds items to a shopping cart.

34
New cards

What ports are typically used by a Web server? by a Web client?

Web server: port 80 (HTTP) and port 443 (HTTPS). Web client: ephemeral port (50,000 or higher).

35
New cards

How are resources uniquely identified in the Web?

By a Uniform Resource Locator (URL).

36
New cards

What does HTTPS provide that HTTP does not?

Authentication of the Web server's identity, origin, and integrity of the data. Confidentiality of the request/response data using encryption

37
New cards

How does HTTPS use shared keys? public keys? private keys?

Shared keys are used to compute HMACs and perform symmetric encryption. Public/private key pairs are used to establish these shared keys via asymmetric techniques.

38
New cards

How are public keys managed in most applications? What tool is often used in Linux?

Public keys are managed using X.509 certificates. OpenSSL is used on Linux.

39
New cards

What is needed to verify an X.509 certificate? Where do you get that data?

The public key of the Issuer, obtained from another certificate in the chain.

40
New cards

Why is a "certificate" usually a certificate chain?

Because it contains a certificate for the Subject, a certificate for the Issuer, and continuing upward until a root CA.

41
New cards

What is Apache? What is httpd?

Apache is a popular open-source Web server. httpd was the original process name for Apache

42
New cards

How is Apache configured by a sysadmin?

Through human-readable text configuration files, with a main file and a configuration directory.

43
New cards

How can a sysadmin obtain a certificate for an Apache server?

Use the default self-signed certificate or generate a new certificate and Certificate Signing Request (CSR), send it to a Certificate Authority (CA), receive a certificate chain, and install it into Apache.

44
New cards

How does a browser verify a certificate?

Using the public key of the Issuer from a certificate chain, and checking the digital signature and validity period.

45
New cards

What does the user of a browser see if a certificate is verified? Not verified?

Verified: https with a padlock icon. Not verified: a warning saying the site is "not secure" or "not trusted."

46
New cards

What does LAMP usually represent? Why is it useful?

Linux, Apache, MySQL, PHP. It provides a standard opensource platform for building and running web applications.

47
New cards

What are options for the "P" in LAMP?

Python, Perl, Ruby.

48
New cards

What are some variants on LAMP?

WIMP (Windows, IIS, MySQL, PHP), LAPP (Linux, Apache, PostgreSQL, PHP).

49
New cards

What is the database component of a typical LAMP server?

MySQL.

50
New cards

Who typically administers security for databases in a large organization?

A Database Administrator (DBA), working with security administrators.

51
New cards

Why is PHP popular for programming Web applications?

PHP is designed for server-side Web development, integrates well with HTML, and allows dynamic content generation.

52
New cards

How are Web pages typically built when some of the content needs to be retrieved from a database?

Using a server-side programming language like PHP to interact with the database and generate HTML.

53
New cards

Is "hacking" a positive term today? Explain.

Can have both positive and negative connotations. Ethical hacking helps organizations. However, because the same tools and techniques can be misused, the term still carries negative baggage in some contexts.

54
New cards

What is "ethical hacking"? What are some other terms for it?

Acting as an outsider to hack into a system to test defenses. Other terms: penetration testing, digital forensics, security research.

55
New cards

What is necessary to make it "ethical"?

Written permission clearly stating what you're allowed to do and following the written scope exactly.

56
New cards

What is Kali Linux? Who are likely users of it?

A Linux distribution designed for digital forensics and penetration testing. Likely users include security researchers, computer forensics professionals.

57
New cards

What different methods can be used to run Kali Linux?

Downloading and installing the image, using pre-built virtual machines, on ARM platforms, as NetHunter on Android, in the cloud, in Docker, as a live boot, on WSL.

58
New cards

How should you protect your system when experimenting with vulnerable software?

Use VMware and set the network to host-only to keep everything contained.

59
New cards

What is reconnaissance in the network context? Who does it? Why?

Gathering information about systems on a network. Done by penetration testers, vulnerability testers, and potentially attackers to discover IP addresses, open ports, etc.

60
New cards

What is nmap? Can you describe some of its capabilities?

Nmap (Network Mapper) is a network exploration tool and security port scanner. Its target specification using hostnames, IPs, or files; Host discovery; port scanning; OS detection; Service/version detection by probing open ports.

61
New cards

What is Metasploit? Who might use it? Why?

A free tool that includes hundreds of known vulnerabilities and exploits. It is used by both ethical testers and hackers to exploit vulnerabilities.

62
New cards

What is an "intruder" in the information security context?

Someone who gains or attempts to gain access to a system or resource without authorization.

63
New cards

What are different types of intrusion?

"Trespass": Gaining physical access to a secure area or system; "Penetration": Gaining logical access ; "Reverse engineering"; "Cryptanalysis": Converting encrypted data to plain text without the decryption key, often by exploiting weaknesses in the system.

64
New cards

What is intrusion detection? What is extrusion detection?

Intrusion detection: sensing and analyzing system events to notice unauthorized access attempts.

Extrusion detection: monitoring for unauthorized outbound transfers from inside the system.

65
New cards

What is an IDS? What is an IPS?

IDS: Intrustion Detection System : a system that automates monitoring events and analyzing them for signs of security problems;

IPS: Intrusion Prevention System: aims to block intrusions in real time, but it does not guarantee prevention.

66
New cards

How does misuse detection (signature-based analysis) work?

Compares observed events against a database of known attack signatures. It's fast and accurate for known threats but cannot detect new or unknown attacks

67
New cards

How does anomaly detection (profile-based analysis) work?

Builds a profile of normal behavior and triggers an alert when activity deviates significantly from that profile.

68
New cards

In the analysis process, what is a false negative? What is a false positive? What happens if you get false negatives? What happens if you get false positives? Why can't you eliminate all false negatives and all false positives?

A false negative occurs when the system fails to detect a real intrusion; A false positive (or false alarm) occurs when the system reports an intrusion that didn’t happen. It's not possible to eliminate both entirely because there is always a trade-off.

69
New cards

What is a passive response in an IDS? What is an active response?

Passive: writing to a log file or sending an alert. Active: altering the system's operation automatically to defend against a potential intrusion.

70
New cards

Why should you NOT take automated counter-offensive action against a possible intruder's system?

Counter-offensive action is discouraged because it may irritate the intruder, prompting a more aggressive attack. Also, the action will be illegal.

71
New cards

What is a host-based IDS? What is a network-based IDS?

Host-based IDS: runs directly on an end-user device. Network-based IDS: a standalone device inserted into a network link.

72
New cards

What is Snort? What does a Snort subscription provide?

Snort is a widely used open-source IDS/IPS that runs on Linux and uses human-readable rule files for configuration. A subscription provides access to these rules with a delay or immediate access.

73
New cards

What are the important components of a Snort rule?

Header (action, protocol, IP addresses, ports, direction) and options (content matching, offset, message).

74
New cards

Can you describe some Snort rule options?

content, msg, offset, nocase, flags, pcre.

75
New cards

What types of networking have been used in the past?

Bus topology, ring topology, and computer-to-computer connections using crossover cables.

76
New cards

What types of networking are commonly used today?

Star topology (hub and spoke).

77
New cards

How is a wired local area network (LAN) typically configured?

Star topology with a central switch connecting all computers.

78
New cards

How is a wireless local area network (LAN) typically configured?

Using Wi-Fi access points (APs). which often act as DHCP servers.

·       Clients connect using the SSID (network name) and a pre-shared key (PSK) (password).

·       Clients typically receive IP addresses via DHCP, unless manually assigned.

·       APs connect to switches, which then connect to a router, or in smaller setups, clients connect directly to a router/AP combo device.

79
New cards

What is a loopback interface?

A special internal interface used for testing the system's own networking stack, with IP 127.0.0.1.

80
New cards

How are network interfaces configured in Linux?

Automatically during system boot, manually by editing config files, or using NetworkManager.

81
New cards

What are some useful commands to check the network configuration and status?

ip a, ping, uname -a, ss or netstat, ifconfig, iftop.

82
New cards

What are some different ways an interface can be assigned a name in Linux?

Original kernel-based naming, persistent naming (udev rules), and predictable naming based on hardware location.