Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Linux Operating System Security: 50 Questions and Verified Solutions, Exams of Advanced Data Analysis

This comprehensive set of 50 multiple-choice questions and verified solutions covers key aspects of Linux operating system security. It's a valuable resource for students and professionals looking to strengthen their understanding of Linux security principles and practices. The questions delve into topics like secure file handling, single user mode risks, secure file deletion, package management, firewall configuration, VPNs, bash scripting, SSH tunneling, chroot, user identification, UEFI, package management programs, IPv6 addressing, network intrusion detection systems, authentication services, bash script editing, user password management, Linux virus prevention, wireless security, GRUB configuration, process management, password hashing algorithms, security misconfigurations, SQL injection, system hardening, automated installations, user account management, software updates, remote system interaction, package repositories, firewall policies, file system activity monitoring, custom

Typology: Exams

2024/2025

Available from 03/03/2025

N-U-R-S-E
N-U-R-S-E 🇺🇸

2

(2)

3.3K documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Page | 1
FEDVTE- LINUX OPERATING SYSTEM
SECURITY 2025 QUESTIONS AND
VERIFIED SOLUTIONS| ABSOLUTE
SUCCESS GUARANTEED.
1. What program could you use on a Linux system to securely copy files to
a Linux host running the SSH server daemon? - correct answer - SCP
2. Single user mode in Linux is a security risk if a malicious actor has
physical access to the host - correct answer - True
3. srm is a tool used to securely delete files from the file system - correct
answer - True
4. What software installation package format is used on Red Hat? - correct
answer - DPKG (?)
5. With IPTables what default policy should be used for packets for
maximum security? - correct answer - DROP
6. IPSec PPTP and SSL are all examples of: - correct answer - VPNs
pf3
pf4
pf5
pf8

Partial preview of the text

Download Linux Operating System Security: 50 Questions and Verified Solutions and more Exams Advanced Data Analysis in PDF only on Docsity!

FEDVTE- LINUX OPERATING SYSTEM

SECURITY 2025 QUESTIONS AND

VERIFIED SOLUTIONS| ABSOLUTE

SUCCESS GUARANTEED.

  1. What program could you use on a Linux system to securely copy files to a Linux host running the SSH server daemon? - correct answer - SCP
  2. Single user mode in Linux is a security risk if a malicious actor has physical access to the host - correct answer - True
  3. srm is a tool used to securely delete files from the file system - correct answer - True
  4. What software installation package format is used on Red Hat? - correct answer - DPKG (?)
  5. With IPTables what default policy should be used for packets for maximum security? - correct answer - DROP
  6. IPSec PPTP and SSL are all examples of: - correct answer - VPNs
  1. A BASH script must be compiled into an executable object in order to run. - correct answer - False
  2. You can use SSH to tunnel and encrypt traffic between a client and a server. - correct answer - True
  3. chroot confines a process to a specific directory - correct answer - True
  4. GID UID and EUID stand for: - correct answer - Group User and Effective User Identification numbers
  5. What is Unified Extensible Firmware Interface designed to do? - correct answer - Prevent malicious actors from modifying the boot loader or booting the computer with a different operating system
  6. Which of the following are package management programs which install or update or remove packages on a Linux system? - correct answer - All
  1. If you use GRUB to manage different boot options on your Linux host and want to increase security especially for physical access you should - correct answer - Configure GRUB to prompt for a password to boot a partition
  2. A process is an address space and a set of data structures which track the process status priority owner signals and resources. - correct answer - True
  3. What hashing algorithms can be used to hash passwords in the /etc/shadow file? - correct answer - All of these
  4. Misconfigurations are a more likely security threat than viruses on Linux. - correct answer - True
  5. What type of attack is enabled by lack of input validation in applications? - correct answer - SQL injection
  6. If you wanted to protect a Linux system from being booted into single user mode which security feature would you configure and use? - correct answer - GRUB
  1. What base directory would you put a script in if you wanted it to automatically start when the operating system starts? - correct answer - /etc/rc.d
  2. Regularly reviewing user accounts on a system and disable old unused accounts is a good step to take in hardening a system. - correct answer - True
  3. RPM will check for dependencies and install them when installing a program. - correct answer - True
  4. Which documents or resources can you review for guidance on hardening a Linux system: - correct answer - All of these
  5. What tool is used to perform automated installs of Red Hat Linux? - correct answer - Kickstart
  6. To quickly deny a user access to the system set their login shell to /bin/false. - correct answer - True
  7. Which command could you use to update software on a Linux host? - correct answer - Both apt-get upgrade and yum update
  1. 127.0.0.1 is an example of what type of address? - correct answer - IPv
  2. What Linux security feature can be used to log, drop, reject, or alter packets? - correct answer - IPTables
  3. Scripting is a good way to automate manual or time intensive tasks such as backups or running programs on a scheduled basis or monitoring and checking system settings. - correct answer - True
  4. What program allows you to interactively execute programs or commands as the root user? - correct answer - sudo
  5. Which file in Linux tells the system which DNS server to use? - correct answer - /etc/resolv.conf
  6. What tool could you use to monitor current file system activity? - correct answer - LSOF (?)
  7. Why might you install a custom repository and direct all the Linux clients in your network to it? - correct answer - All
  1. An attacker who places an entry such as 74.213.42. www.cmu.edu in the /etc/hosts file could redirect users to a malicious server. - correct answer - True
  2. What program could you use to conduct a technical vulnerability scan of a Linux host? - correct answer - Nessus
  3. What service would you use to schedule a script to run at a certain pre-determined time? - correct answer - cron
  4. What is the most restrictive and secure setting for state and policy in SELinux? - correct answer - Enforcing - Strict
  5. The Pluggable Authentication Module (PAM) provides: - correct answer - A centralized authentication functions for programs and applications on the system