Computer Security and OpenSSL
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of a denial-of-service attack?

  • To install malware on a system
  • To gain unauthorized access to a system
  • To make a network or server unavailable (correct)
  • To steal sensitive information
  • What is the purpose of the `getcifsacl` command?

  • To display the ACL of a file system (correct)
  • To set permissions on a file system
  • To unmount a file system
  • To mount a file system
  • What is the default timeout period for OpenVPN control packets?

  • 10 seconds
  • 2 seconds (correct)
  • 1 second
  • 5 seconds
  • What permission bit allows a user to modify a file?

    <p>Write</p> Signup and view all the answers

    What is the primary function of the rkhunter tool?

    <p>To detect rootkits and other security threats</p> Signup and view all the answers

    What is the purpose of a certificate chain?

    <p>To verify the authenticity of a digital certificate</p> Signup and view all the answers

    What iptables command changes the source IP address for all IPv4 packets going through the eth0 interface?

    <p>iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source 192.0.2.11</p> Signup and view all the answers

    What is the purpose of the ACL prefix 'OWNER' in the output of getcifsacl?

    <p>To specify the owner of a file system</p> Signup and view all the answers

    What is the primary function of the NSEC or NSEC3 records in a DNS zone?

    <p>To prevent zone enumeration</p> Signup and view all the answers

    What is the main purpose of a PTR record in a DNS zone?

    <p>To map an IP address to a hostname</p> Signup and view all the answers

    What is the primary function of a Certificate Revocation List (CRL)?

    <p>To list X.509 certificates that have been revoked</p> Signup and view all the answers

    What is the main purpose of a DNSKEY record in DNSSEC?

    <p>To sign a DNS zone</p> Signup and view all the answers

    What is the primary goal of phishing attacks?

    <p>To steal sensitive information from a victim</p> Signup and view all the answers

    What is the main purpose of AIDE?

    <p>To detect intrusions and system changes</p> Signup and view all the answers

    What is the primary goal of social engineering attacks?

    <p>To trick victims into divulging sensitive information</p> Signup and view all the answers

    What is the primary function of host intrusion detection (HID) systems?

    <p>To monitor and detect potential security threats on a single computer or server</p> Signup and view all the answers

    What is the primary function of the chkrootkit tool?

    <p>To scan a Linux system for rootkits</p> Signup and view all the answers

    What happens when the getfattr command is run on a file with no extended attributes set?

    <p>No output is produced and it exits with a value of 0</p> Signup and view all the answers

    What is the correct command to delete the second key of a LUKS device?

    <p>cryptsetup luksDelKey /dev/sda1 2</p> Signup and view all the answers

    What is a characteristic of eCryptfs?

    <p>It does not support encryption of home directories for regular Linux users</p> Signup and view all the answers

    What command is used to disable automatic password expiry for a user?

    <p>chage --maxdays -1 username</p> Signup and view all the answers

    What is the purpose of OpenSCAP?

    <p>To monitor system processes for security compliance</p> Signup and view all the answers

    What is the function of the rpm command?

    <p>To verify the integrity of RPM packages</p> Signup and view all the answers

    What is a characteristic of a LUKS device?

    <p>It can have multiple keys</p> Signup and view all the answers

    What parameter in OpenSSL specifies the host name for TLS Server Name Indication?

    <p>-servername</p> Signup and view all the answers

    What type of extension is added to a certificate for the host names example.org and www.example.org?

    <p>X 509v3 Subject Alternative Name</p> Signup and view all the answers

    What is a buffer overflow?

    <p>A software vulnerability</p> Signup and view all the answers

    Which tool is used to manage the Linux Audit system?

    <p>auditd</p> Signup and view all the answers

    What is the difference between a SetUID and SetGID bit?

    <p>SetUID allows a file to be executed with the permissions of the file owner, while SetGID allows a file to be executed with the permissions of the group owner</p> Signup and view all the answers

    What is a valid AIDE rule?

    <p>!/var/run/.*</p> Signup and view all the answers

    What command in the Linux Audit system provides searching and filtering of the audit log?

    <p>ausearch</p> Signup and view all the answers

    What is the purpose of the TLS Server Name Indication extension?

    <p>To specify a host name for a TLS connection</p> Signup and view all the answers

    What is the primary purpose of a Certificate Revocation List?

    <p>To allow a server to provide proof of the revocation status of certificates</p> Signup and view all the answers

    What is the command to install and configure a new FreeIPA server?

    <p>ipa-server-install</p> Signup and view all the answers

    What is the OpenSSL command to generate a certificate signing request (CSR) using an existing private key?

    <p>openssl req –new –key private/keypair.pem –out req/csr.pem</p> Signup and view all the answers

    What is Cryptography?

    <p>The art of sending secret messages</p> Signup and view all the answers

    What type of activity does HID monitor for?

    <p>Unauthorized access attempts</p> Signup and view all the answers

    What is NOT a benefit of using HID?

    <p>Provides automatic removal of detected threats</p> Signup and view all the answers

    What is the term for the encrypted message?

    <p>Ciphertext</p> Signup and view all the answers

    What is the purpose of a Certificate Authority?

    <p>To issue certificates to servers</p> Signup and view all the answers

    Study Notes

    OpenSSL Parameters

    • -servername specifies the host name to use for TLS Server Name Indication.

    OpenSSL Configuration

    • The line subjectAltName = DNS: www.example.org, DNS:example.org adds an X.509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate.

    Security Threats

    • A buffer overflow is a type of software vulnerability.
    • Phishing is a type of social engineering attack.

    Linux File Permissions

    • SetUID allows a file to be executed with the permissions of the file owner.
    • SetGID allows a file to be executed with the permissions of the group owner.
    • The permission bit Write allows a user to delete a file.

    Linux Audit System

    • The command auditd is used to manage the Linux Audit system.
    • The command aureport provides searching and filtering of the audit log.

    AIDE

    • AIDE is used to detect intrusions and system changes.
    • The command aide is used to manage system audits.

    OpenVPN

    • OpenVPN sends a control packet to its peer and expects an acknowledgement in 2 seconds by default.
    • The option --tls-timeout 5 changes the timeout period to 5 seconds.

    Certificate Management

    • A certificate chain is a sequence of certificates used to verify the authenticity of a digital certificate.
    • A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA.

    DNS and DNSSEC

    • The DNS record PTR is used to map an IP address to a hostname.
    • The DNS record DNSKEY is used to sign a DNS zone.

    Host Intrusion Detection

    • HID monitors for unauthorized access attempts.
    • HID does not provide automatic removal of detected threats.

    Cryptography

    • Cryptography is the art of sending secret messages.
    • A ciphertext is the encrypted message.

    Disk Encryption

    • The command cryptsetup is used to manage disk encryption.
    • The command getfattr is used to check for extended attributes on a file.

    eCryptfs

    • eCryptfs is a system that encrypts files and directories.
    • eCryptfs does not store the contents of all files in an archive file.
    • eCryptfs can be used to encrypt only directories that are the home directory of a regular Linux user.

    FreeIPA

    • The command ipa-server-install installs and configures a new FreeIPA server, including all sub-components, and creates a new FreeIPA domain.

    Rootkit Detection

    • The command chkrootkit is used to detect rootkits on a Linux system.
    • The command rkhunter is used to detect rootkits and other security threats.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    303-300-1.pdf

    Description

    This quiz covers various aspects of computer security, including OpenSSL parameters, configuration, and common security threats. It also touches on Linux file permissions.

    More Like This

    at Command Pop Quiz 2
    5 questions

    at Command Pop Quiz 2

    GuiltlessAshcanSchool avatar
    GuiltlessAshcanSchool
    SSH Implementations and Usage
    24 questions

    SSH Implementations and Usage

    CleanestLivermorium4445 avatar
    CleanestLivermorium4445
    Peligros de Archivos .bat y OpenSSH
    13 questions

    Peligros de Archivos .bat y OpenSSH

    SociableMahoganyObsidian9910 avatar
    SociableMahoganyObsidian9910
    Use Quizgecko on...
    Browser
    Browser