Ôn OSP201 Key 2
Ôn OSP201 Key 2
| Linux
GUI applications can be assessed over an SSH connection.
What are the advantages of virtualization in a Linux infrastructure? | Cost savings by purchasing
less hardware - Security advantages with more bastion hosts
Kernels released for different architectures vary because different platforms have different |
CPU's
Which of the following Samba directives specify permissions of files created on a shared
network directory | creat_mask
Which of the following commands is associated with the Linux unified key setup disk
encryption specification | cryptsetup
You type the following command: $ runlevel 5 3 What can you tell about your runlevel status? |
The current runlevel is 3. The previous runlevel is 5.
which of the following is an advantage of compiling a customized kernel rather than using a
vendor-supplied kernel | A custom kernel is easier to update and maintai
Which of the following kernel types is most likely to work with the smallest amount of RAM |
Virtual machine
Which of the following is a positive effect of virtualization on security? | Additional virtual
machines make it possible to configure more bastion hosts
Which of the following statements best describes the structure of the Linux kernel? | A
monolithic core with modular components
Which of the following hardware components is NOT used to boot a Linux system? | An
Ethernet port
From the following options, name the component that is NOT part of a Linux User Domain. |
Computer users
The read, write and execute permissions of a file would be an example of a? | Discretionary
access control
LUKS is a specification for _____ ? | disk encryption
Red Hat and Ubuntu are examples of | distributions
What part of a network is best for bastion servers | A DMZ
Which of the following security certifications is associated with open source software? | OSPA
Under normal circumstances, what happens when a system can't be booted with a newly
installed Linux kernel? | The old kernel is still available through the boot loader
Which of the following roots of trust is associated with the BIOS/UEFI? | The Root Trust for
Networking
Which service script in the /etc/init.d/ directory is not related to SELinux | dund
Which of the following is an example of discretionary access controls? | User-defined read,
write, and execute permissions
You configured quotas on a Linux system. Which command do you use to edit the quota of a
specific user | edquota
Which of the following commands starts a console-based Web browser | elinks
How do you exit Vi's insert mode in order to type command-mode commands? | Esc key
which directory does the FHS recommend for locating the configuration files? | /etc/
Which file is used to configure the various mounting options of a file system upon boot? |
/etc/fstab
Which of the following file is used to configure ACLs for a filesystem | /etc/fstab
Script in which of the following directories can be used to deactive a currently running services |
/etc/init.d/
Which of the following directories contains scripts that control servies | /etc/init.d/
From which of the following files do iptables read ports of well-known services? | /etc/services
Which of the following files is not normally readable by all users | /etc/shadow
Which of the following files contains information about time limits on a password | /etc/shadow
Which of the following files Is not a part of the shadow password suite? | /etc/sudoers
Tuning the kernel parameters, such as the networking functionality can be accomplished by
editing the ____ file? | /etc/sysctl.conf
The file to configure the various logging subsystem facilities for sysklogd package is |
/etc/syslog.conf
Enter the full path to the main configuration file associated with the extended internet super
server: | /etc/xinetd.conf
Which of the following client can connect to a Microsoft Exchange server | Evolution
Which of the following PolicyKit concepts is associated with configuring access rules to special
desktop tools by user | Explicit authorizations
Which of the following filesystem formats is best suited for a smailler filesystem | ext2
The ___ command searches for all files owned by the group named audio. Assume you're logged
into the root administrative account | find / -group audio
the iptables command is used to configure | The Firewall
What is the first most important step in responding to a compromised system? | Follow what is
outlined in the incident response plan.
What is a common use for Linux in the LAN-to-WAN Domain | Gateway
The open source license associated with the GNU project is __________. | General Public
License (GPL)
The command that lists the current ACL rules on the local file named test1 is ______. Assume
your user account is the owner of file test1 | getfacl test1
A user only needs access to execute networking-related commands. What type of access should
be granted using the principle of least privilege? | given sudo access to all of root's commands/to
Networking
Which of the following laws ensures that all U.S-based financial institutions protect personal
financial information of their clients? | GLBA
Which of the following directories contain GPG private and public key | .gnupg
Which of the following is a difference between security vulnerabilities associated with open
source software and proprietary software? | Typically, open source software vulnerabilities are
immediately made public
What will be the impact of changing the GRUB option timeout=5 to timeout=0 on the Linux
OS? | The boot loader will immediately boot the operating system into the default kernel.
Which of the following user account information can be found in the /etc/passwd file? | The
user's basic information, such as the default login shell
Configuring a user account policy with minimum password length, maximum days for using a
password, and various user logins can be performed by editing the _____ file? | login.defs
which of the following control flags used in PAM approves user access assuming that there are
no previous failures? | sufficient
If a share on a MS windows host needs to mount on the Linux filesystem, which network service
would typically be used? | SAMBA
Which mounting option enables user quotas on a filesystem? | usrquota
Running a network service in a chroot environment is considered a layer of security because: |
The service runs in isolation in its own virtual-like environment
In addition to username/passwords, SSH can authenticate a user based upon | A passphrase using
a public and private key
A "vanilla" kernel has _____? | a stock built from the mainline kernel
which of the following is the correct method to apply a new kernel built on a Linux system |
Install it as a new kernel leaving the original kernel in place
Which is the native package manager for Ubuntu and other Debian-based distributions? | APT
Why is it important to install anti-virus software for Samba file servers in a MS windows
environment? | Because shared files on the Samba server can contain viruses that can infect
Windows clients.
AIDE can be described as | A host-based intrusion detection software.
which command helps to better understand the networking subsystem | netstat
The command that list currently loaded GPG key is ____ | Gpg --list-key
Which command is used to install GRUB Legacy into the MBR of your first SATA hard drive? |
grub-install /dev/sda
The string root (hd1,5) appears in your /boot/grub/menu.lst file. What does this mean? | GRUB
Legacy looks for files on the sixth partition of the second disk.
The command that can be used to set up an encrypted password for a traditional GRUB
configuration file is __________. | grub-md5-crypt
A developer who just wants to create better software in the open source world is known as a
__________. | Hackers
Which of the following directories is appropriate for quotas | /home/
Which of the following directories are suitable for separate files systems (Select two) | /home/
and /var/
The Web site associated with the Linux Kernel Organization is __________. | http://kernel.org
What line in /etc/inittab would indicate that your default runlevel is 5? | id:5:initdefault:
How would you remove two lines of text from a file using Vi? | In command mode, position the
cursor on the first line, and type 2dd.
What is the first program that the Linux kernel runs once it's booted in a normal boot process? |
init
How might you identify an initial RAM disk file in GRUB 2? | initrd /boot/initrd-3.4.2
What does runlevel 4 do? | Its purpose isn't standardized, so it can be used for anything you like.
What is included in a typical Linux distribution | Kernel, tools, libraries and application
You want to boot a Linux system into single-user mode. What option might you add to a Linux
kernel's options list at a boot loader to accomplish this task | I
Which of the following is the best choice for network authentication | LDAP
Enter the _____ directory for PAM modules | /lib/security/
Which of the following is a valid reason to use a Live CD on a suspected compromised system? |
The live CD can be used for forensic analysis.
Members of which of the following groups are frequently set up as printer administratos |
lpadmin & sys
Which of the following options is a development tool that compiles source code | make
Which of the following is one of the best descriptions for OSSTMM? | A methodology used by
open source security professionals to measure compliance
Which command formats all Linux system, Microsoft VFAT..... | mkfs
Which of the following directories contain the standard chroot jail location for Red Hat BIND
server | ncsd
Which service script in the /etc/init.d/ directory is not related to NFS | ncsd
Which of the following tools would be most appropriate to periodically scan all Linux servers
for vulnerabilities? | Nessus
Which of the following is a fake shell you can use for nonstandard users | nologin
ClamAV can be described as: | An open source antivirus solution mainly used on Linux e-mail
gateways.
Which of the following directories typically includes files associated with third-party | /opt/
A system administrator types the following command: # shutdown -c What is the effect of this
command? | A previously scheduled shutdown is cancelled.
Which of the following statements is true with the user private group scheme | The primary UID
for the user is the same as the primary GID for the user
What is Canonical? | The private company behind Ubuntu
In a suspected compromised system, which of the following files will have the current data
stored in RAM? | /proc/kcore
In Vi's command mode, you type :q!. What is the effect? | The program terminates without
saving your work
Know the Linux command for listing all running processes. | ps aux or just ps
An enterprise running RHEL that wishes to control its own repository locally for package
updates may consider using | Red Hat Satellite Server
Which of the following options for script in the /etc/init.d/ directory does not kick off users who
are currently connected to a servic | reload
Which of the following commands list quota useage by user | repquota
Which entry in the standard /etc/sudoers file gives the root administrative user | root
ALL=(ALL) ALL
Which of the following command can help identify network ports used by NIS through the
portmapper | rpcinfo -p
Which of the following commands list currently installed packages on Linux | rpm -qa
Which of the following commands is used to transfer data over an SSH connection in encrypted
format? | rsync -e ssh
Using Linux as a desktop typically involves the added security risk of: | Running GUI
applications
from a security perspective, what is the advantage of SAMBA over NFS when installed with the
standard configuration? | Samba has username and passowrd authentication as part of its built-in
functionality
Which runlevels are reserved by init for reboot,shutdown, and single-user mode purposes | 0,1,6
The init process always gets a PID of | 1
If your system has 1 GB of RAM, how big should your swap partition be? | 2 GB (2x system
memory)
LILO is a __________ bootloader | 2 stage
under OSSTMM, security audits are divided into how many channels | 3
What is the best course of action if you want to take control of those packages that are updated
on your distribution? | Create your own update repository
Which of the following directives in a LILO configuration file specifies the time before the
default operating system is booted? | delay
which of the following is NOT an OSSTMM audit phase? | Licensing
Which of the following is not a SELinux Mode | Allow
All of the below (Optical media [CD/DVD with an ISO], Network installation, Installation from
a live CD/DVD) | the following is an installation method for linux
To access files on a USB pen drive, you type mount /dev/sdc1 /media/pen as root. Which types
of filesystems will this command mount? | Ext2fs, FAT, HFS
/etc/skel | Under the bash shell which is the most appropriate place to set environment variables
that apply to all users?
Which of the following methods can be used to recover from an unbootable situation in Linux,
minimizing any risk of lost data? (select 2) | recovery mode, live cd
In a TrustedGRUB configuration file, which of the following directives refers to the first
partition on the second hard drive? | root (hd1,2)
Which of the following services should NOT be disabled on a bastion host users as an FTP
server? Assume that the host is administered remotely, over an encrypted connection. | SSH
Packages associated with SSH include a client for which of the following protocols? | FTP
The efforts of the open source community | From the following options, select a security
advantage of open source software.
From the following commands, which one updates the GRUB 2.0 configuration file read by the
boot loader? | grub-mkconfig
Which of the following is a security risk associated with the LILO boot loader? | It supports
password-free access to the administrative account
Which of the following options can be subtituted for a partition device in the /etc/fstab
configuration file? (select 2) | Label and UUID
Which of following packages implements TPM support on Linux? (select 2) | tpm-tools, trousers
____ are the on/off settings in SELinux that will allow or deny access for a service to interact
with an object | Booleans
The grub configuration file is generally located in the ___ directory | /boot/
Which of the following directories is most well suited as a read-only filesystem | /boot/
Which filesystem is good candidate for mounting in read-only mode | /boot/
Which of the following is the GRUB 2 boot loader configuration file? | /boot/grub/grub.cfg
Name the Linux service associated with virtual application support. | Wine
To apply administrative privileges for one instance of the su command, which switch do you use
| -c
Which of the following concepts is NOT part of the CIA triad? | Authenticity
The configuration files for BASH are | .bashrc/.profile
Which of the following concepts is NOT one of the five OSSTMM process controls? |
Authenticity
Which of the following is NOT a standard open source option for SMTP e-mail services? |
Dovecot
Which of the following is an open source license? | GNU GPL
Which of the following commands can be used to revise expiration information on a user
password | chage
Which of the following PolicyKit commands can be used to identify user logins by session?
(select 2) | ck-history and ck-list-sessions
From the following answers, what is NOT addressed by TPM chip? | KVM virtual machines
From the following list, which is a system management tool for Linux? | Landscape
Which of the following statements is NOT true about a live CD distribution? Assume your
system can boot from appropriate locations. | It automatically installs that Linux distribution on
your system.
What is an entry-level security certification offered by ISC | CISSP
which command changes file ownership in Linux | chown
Which of the following command sets the SUID bit on the file named filename | chmod 4555
filename
Which of the following commands prohibits access from all users except the user owner and
member of the group that owns the file named filename | chmod 770 filename
Enter the command on Red Hat distributions that includes the defaults status of services with
/etc/init.d/ scripts at each run level: | chkconfig --list
If you try to change files remotely on a shared NFS directory as the root administrative user,
what happens | The chang fails, because the root user on one system is the nobody user on
another system
Which of the following components make up the core of the Linux operating system? | The
kernel
Which of the following OSSTMM channels is associated with wireless security? | SPECSEC
The GRUB 2.0 menu is hidden during the boot process. Which of the following keys, when
pressed at the appropriate time, reveals the menu? | Shift
Which of the following kernel types is most likely to address the most RAM? | Server
Which of the following options is NOT used to block access form certain IP address? | SELinux
Your Lan is on the 192.168.0.0/24 network. Which of the following virtual machine network
options give local virtual machines addresses on that network | Bridged
Which of the following authentication tools work locally? | PAM