FedVTE- Linux Operating System
Security- Questions and Answers
(Grade A+)
What program could you use on a Linux system to securely copy files to a Linux host running
the SSH server daemon?—ANSWER--SCP
Single user mode in Linux is a security risk if a malicious actor has physical access to the
host—ANSWER--True
srm is a tool used to securely delete files from the file system—ANSWER--True
What software installation package format is used on Red Hat?—ANSWER--DPKG (?)
With IPTables what default policy should be used for packets for maximum security?—
ANSWER--DROP
IPSec PPTP and SSL are all examples of:—ANSWER--VPNs
A BASH script must be compiled into an executable object in order to run.—ANSWER--False
You can use SSH to tunnel and encrypt traffic between a client and a server.—ANSWER--True
chroot confines a process to a specific directory—ANSWER--True
GID UID and EUID stand for:—ANSWER--Group User and Effective User Identification
numbers
, What is Unified Extensible Firmware Interface designed to do?—ANSWER--Prevent malicious
actors from modifying the boot loader or booting the computer with a different operating
system
Which of the following are package management programs which install or update or
remove packages on a Linux system?—ANSWER--All
2003:da3:1637:ffff:ffff:ffff:ffff:ffff is an example of what type of address?—ANSWER--IPv6
Bro, Snort, Suricata are examples of what kind of Linux security feature?—ANSWER--
Network Intrusion Detection Systems
In addition to the internal authentication via /etc/passwd and /etc/shadow files, what
services can be used to authenticate users to a Linux host?—ANSWER--Fedora Directory
Service (?)
What program could you use to create or edit a Linux BASH script?—ANSWER--All of the
above
What program should be used to change a user password?—ANSWER--passwd
Why are there very few viruses on Linux?—ANSWER--All
When connecting to an untrusted wireless access points how can you increase your security
and safety of using that access point?—ANSWER--Use a VPN to encrypt your traffic
If you use GRUB to manage different boot options on your Linux host and want to increase
security especially for physical access you should—ANSWER--Configure GRUB to prompt for
a password to boot a partition
© 2026 Copyright. All Rights Reserved. This document is
protected by copyright law, Copyrighted By Brittie Donald
Security- Questions and Answers
(Grade A+)
What program could you use on a Linux system to securely copy files to a Linux host running
the SSH server daemon?—ANSWER--SCP
Single user mode in Linux is a security risk if a malicious actor has physical access to the
host—ANSWER--True
srm is a tool used to securely delete files from the file system—ANSWER--True
What software installation package format is used on Red Hat?—ANSWER--DPKG (?)
With IPTables what default policy should be used for packets for maximum security?—
ANSWER--DROP
IPSec PPTP and SSL are all examples of:—ANSWER--VPNs
A BASH script must be compiled into an executable object in order to run.—ANSWER--False
You can use SSH to tunnel and encrypt traffic between a client and a server.—ANSWER--True
chroot confines a process to a specific directory—ANSWER--True
GID UID and EUID stand for:—ANSWER--Group User and Effective User Identification
numbers
, What is Unified Extensible Firmware Interface designed to do?—ANSWER--Prevent malicious
actors from modifying the boot loader or booting the computer with a different operating
system
Which of the following are package management programs which install or update or
remove packages on a Linux system?—ANSWER--All
2003:da3:1637:ffff:ffff:ffff:ffff:ffff is an example of what type of address?—ANSWER--IPv6
Bro, Snort, Suricata are examples of what kind of Linux security feature?—ANSWER--
Network Intrusion Detection Systems
In addition to the internal authentication via /etc/passwd and /etc/shadow files, what
services can be used to authenticate users to a Linux host?—ANSWER--Fedora Directory
Service (?)
What program could you use to create or edit a Linux BASH script?—ANSWER--All of the
above
What program should be used to change a user password?—ANSWER--passwd
Why are there very few viruses on Linux?—ANSWER--All
When connecting to an untrusted wireless access points how can you increase your security
and safety of using that access point?—ANSWER--Use a VPN to encrypt your traffic
If you use GRUB to manage different boot options on your Linux host and want to increase
security especially for physical access you should—ANSWER--Configure GRUB to prompt for
a password to boot a partition
© 2026 Copyright. All Rights Reserved. This document is
protected by copyright law, Copyrighted By Brittie Donald