100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

FedVTE- Linux Operating System Security | 50 Questions with 100% Correct Answers | Verified | Latest Update 2024

Rating
-
Sold
2
Pages
5
Grade
A+
Uploaded on
14-01-2024
Written in
2023/2024

What program could you use on a Linux system to securely copy files to a Linux host running the SSH server daemon? - SCP Single user mode in Linux is a security risk if a malicious actor has physical access to the host - True srm is a tool used to securely delete files from the file system - True What software installation package format is used on Red Hat? - DPKG (?) With IPTables what default policy should be used for packets for maximum security? - DROP IPSec PPTP and SSL are all examples of: - VPNs A BASH script must be compiled into an executable object in order to run. - False

Show more Read less
Institution
FedVTE- Linux Operating System Security
Course
FedVTE- Linux Operating System Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
FedVTE- Linux Operating System Security
Course
FedVTE- Linux Operating System Security

Document information

Uploaded on
January 14, 2024
Number of pages
5
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

FedVTE - Linux Operating System Security | 50 Questions with 100% Correct Answers | Verified | Latest Update 2024 What program could you use on a Linux system to securely copy files to a Linux host running the SSH server daemon? - ✔✔SCP Single user mode in Linux is a security risk if a malicious actor has physical access to the host - ✔✔True srm is a tool used to securely delete files from the file system - ✔✔True What software installation package format is used on Red Hat? - ✔✔DPKG (?) With IPTables what default policy should be used for packets for maximum security? - ✔✔DROP IPSec PPTP and SSL are all examples of: - ✔✔VPNs A BASH script must be compiled into an executable object in order to run. - ✔✔False You can use SSH to tunnel and encrypt traffic between a client and a server. - ✔✔True chroot confines a process to a specific directory - ✔✔True GID UID and EUID stand for: - ✔✔Group User and Effective User Identification numbers What is Unified Extensible Firmware Interface designed to do? - ✔✔Prevent malicious actors from modifying the boot loader or booting the computer with a different operating system Which of the following are package management programs which install or update or remove packages on a Linux system? - ✔✔All 2003:da3:1637:ffff:ffff:ffff:ffff:ffff is an example of what type of address? - ✔✔IPv6 Bro, Snort, Suricata are examples of what kind of Linux security feature? - ✔✔Network Intrusion Detection Systems In addition to the internal authentication via /etc/passwd and /etc/shadow files, what services can be used to authenticate users to a Linux host? - ✔✔Fedora Directory Service (?) What program could you use to create or edit a Linux BASH script? - ✔✔All of the above What program should be used to change a user password? - ✔✔passwd Why are there very few viruses on Linux? - ✔✔All When connecting to an untrusted wireless access points how can you increase your security and safety of using that access point? - ✔✔Use a VPN to encrypt your traffic If you use GRUB to manage different boot options on your Linux host and want to increase security especially for physical access you should - ✔✔Configure GRUB to prompt for a password to boot a partition A process is an address space and a set of data structures which track the process status priority owner signals and resources. - ✔✔True What hashing algorithms can be used to hash passwords in the /etc/shadow file? - ✔✔All of these Misconfigurations are a more likely security threat than viruses on Linux. - ✔✔True

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ClassHero Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
727
Member since
2 year
Number of followers
396
Documents
10234
Last sold
15 hours ago

3.9

112 reviews

5
59
4
15
3
21
2
4
1
13

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions