1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which Linux distribution is based on Debian and Ubuntu, uses the same package-management system and Debian and Ubuntu, and lets you choose between the Mate and Cinnamon desktop environments?
linux mint
Which of the following is commonly exposed to outside systems from within an enterprise; is the way customers get access to information, products, and services offered by businesses; and is relied upon for many business-to-business services?
web server
True or False? TCP Wrapper wraps existing service programs, offering them network-level protections.
T
You are configuring a firewall platform that is managed through the firewall-cmd command-line option. What are you working with?
firewall-cmd
What displays after running the service --status-all command on a system such as Ubuntu or Linux Mint?
Option A
A list of all the services on a system and their status
The execute permission is not set on a directory on a Linux system. Which of the following is the most likely result?
Option B
You cannot change into that directory using the cd command.
Which of the following enables a Linux system to be used as a Windows domain controller to authenticate Windows users?
Samba
True or False? An administrator can use Telnet to encrypt communications when connecting from a remote system.
F
Which of the following is a distribution based on Debian?
MINT
True or False? Branches in Linux source code repositories help keep malicious software or software with vulnerabilities out of production.
T
True or False? A threat vector describes a way for an attacker to get into a system.
T
True or False? The concept that Linux source code should be freely available means that it should be without cost.
F
What is one of the first host-based intrusion-detection systems deployed under Linux? It is now a commercial product that monitors operating system files.
tripware
True or False? The majority of security vulnerabilities within Linux distributions are found within the applications and services that run on top of the kernel.
T
You are selecting a package-management system to install programs on your Linux Ubuntu distribution. Which one do you choose?
RPM red package manager
True or False? You can set the runlevel by using the init command and passing the runlevel to it.
T
True or False? The term "copyleft" is associated with the GNU General Public License (GPL).
true
You are running a firewall, but it is not on a Linux host. The operating system is Unix based but the kernel is different. What is the most likely system you are on?
BSD
True or False? Without proper controls in place, an attacker who gets access to a host system can make changes to any virtual machine on that host.
false
A discretionary access control for a file is a control mechanism that is set by:
the user owner of the file
True or False? Platform as a Service (PaaS) provides a complete web application solution for easier application development.
true
A malicious attacker wants to use a Knoppix live CD to gain unauthorized access to a computer protected by a username and password. What sort of access is needed?
physical access
True or False? Samba can be configured to authenticate to a Windows Active Directory server.
true
Which of the following is a mandatory access control system used by Red Hat distributions by default?
SELinus=x
True or False? A hardened Linux system typically contains fewer packages to be monitored for updates in case vulnerabilities are found in the software.
true
Service startup scripts are located in which directory in many Linux distributions?
/srv/init.d/
True or False? Most Linux distributions have pre-compiled packages, which determine all the dependencies.
true
You are a malicious attacker. You want to install a Microsoft-based boot loader on a Linux system to gain control of the boot process. Which boot loader do you choose?
NTLDR
The _________ part of a kernel contains drivers and features essential to the kernel boot process.
monolithic
True or False? Cloud computing is a computing service offered by a provider via the cloud, or Internet.
true
Which of the following is the best definition of a bastion host?
a sys that is presented to the outside world that can be used to protect other sys that are sensitive
True or False? Transmission Control Protocol (TCP) is a protocol and service for synchronizing clocks across systems on a network.
false
You are a systems administrator. You are setting up new servers and workstations for your organization and plan to run Red Hat Enterprise Linux (RHEL) on all of the servers. Of the following, which distribution is the best choice for the workstations and is most closely associated with RHEL?
fedora
Deidre is a Linux security administrator. She is responsible for maintaining a large number of Ubuntu servers. She wants to use a centralized management tool to update several systems. Which of the following fits Deidre's needs?
canonical landscape
What is a common application-level virtualization tool for Linux?
Wine Is No an Emulator
One of the advantages of systemd over init is that services can be:
started in parallel
True or False? The primary boot loaders in Linux are Grand Unified Bootloader (GRUB) and Linux Loader (LILO).
true
________ is the software that manages and runs virtual machines.
hypervisor
True or False? If you install a Linux security update and it negatively impacts the system, you can attempt to uninstall the update to correct the situation.
true
Typical deployment options for Linux servers include all of the following except:
deploying on a usb drive
What is Snort?
an intrusion detection service
True or False? A Linux service that runs in the background is called a shell.
false
True or False? A hypervisor is a software interface designed specifically for virtual machines with limited resources.
true
True or False? To use access control lists (ACLs) in Linux to supersede regular file permissions, the target Linux filesystem(s) must be configured and mounted with the ACL option and then ACL masks must be configured.
true
Which of the following is true regarding open-source software versus commercial software?
open source projects put their source code out on the open internet at public repositories
True or False? Linux can operate as a hypervisor in and of itself, so it can also run as a guest operating system inside any other hypervisor.
true
You are a Linux power user. You run the service command on a Linux Mint machine. The command returns a list of services and their status. What symbol indicates that a service doesn't exist or did not return anything?
?
True or False? Linux "open-source" means the source code cannot be viewed or modified by anyone other than the individual or company that developed the code.
false
True or False? The C-I-A triad and Parkerian hexad define concepts with respect to information security.
true
Which Linux distribution uses a package-management system based on the ports system from FreeBSD?
gentoo linux