Podcast
Questions and Answers
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
- username
- uid (correct)
- owner
- gid
Where should private keys be created and stored?
Where should private keys be created and stored?
- On a system with a secure connection
- On a shared network drive
- On a public key server
- On a system where they will be used (correct)
What is the primary purpose of NSEC3 in DNSSEC?
What is the primary purpose of NSEC3 in DNSSEC?
- To authenticate a DNS server
- To provide information about DNSSEC key signing keys
- To prevent zone enumeration (correct)
- To sign a DNS zone
Which command is used to change the SELinux context for a user?
Which command is used to change the SELinux context for a user?
What is a key used for encryption that is different from the key used for decryption?
What is a key used for encryption that is different from the key used for decryption?
Which file is used to configure AIDE?
Which file is used to configure AIDE?
Which of the following is an example of a behavioral-based HID technique?
Which of the following is an example of a behavioral-based HID technique?
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
What is the purpose of ndpmon?
What is the purpose of ndpmon?
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Which option in an Apache HTTPD configuration file enables OCSP stapling?
What is an asymmetric key used for?
What is an asymmetric key used for?
Why should private keys have a sufficient length for the algorithm used for key generation?
Why should private keys have a sufficient length for the algorithm used for key generation?
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Which parameter to openssl s_client specifies the host name to use for TLS Server Name Indication?
Which parameter to openssl s_client specifies the host name to use for TLS Server Name Indication?
Which of the following lines in an OpenSSL configuration adds an X509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?
Which of the following lines in an OpenSSL configuration adds an X509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?
What is a buffer overflow?
What is a buffer overflow?
Which tool can be used to manage the Linux Audit system?
Which tool can be used to manage the Linux Audit system?
What is the difference between a SetUID and SetGID bit?
What is the difference between a SetUID and SetGID bit?
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
What is the purpose of the Linux Audit system?
What is the purpose of the Linux Audit system?
What is Linux Malware Detect?
What is Linux Malware Detect?
What is a Trojan?
What is a Trojan?
What is a rogue access point?
What is a rogue access point?
Which command is used to generate DNSSEC keys?
Which command is used to generate DNSSEC keys?
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
What is a DoS attack?
What is a DoS attack?
What is a trust anchor?
What is a trust anchor?
What is the purpose of getfacl?
What is the purpose of getfacl?
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?
Which of the following commands adds a new user to FreeIPA?
Which of the following commands adds a new user to FreeIPA?
What is the purpose of rkhunter?
What is the purpose of rkhunter?
What is a certificate chain?
What is a certificate chain?
Which of the following commands changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Which of the following commands changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
What is the purpose of a Certificate Authority (CA)?
What is the purpose of a Certificate Authority (CA)?
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Which of the following DNS records are used in DNSSEC?
Which of the following DNS records are used in DNSSEC?
Which command is used to add users using SSSD’s local service?
Which command is used to add users using SSSD’s local service?
What is the primary purpose of a mechanism that allows a server to provide proof of its own identity to clients?
What is the primary purpose of a mechanism that allows a server to provide proof of its own identity to clients?
Which command is used to install and configure a new FreeIPA server?
Which command is used to install and configure a new FreeIPA server?
What is the purpose of a certificate signing request (CSR) in cryptography?
What is the purpose of a certificate signing request (CSR) in cryptography?
What is the primary goal of cryptography?
What is the primary goal of cryptography?
What type of activity does HID primarily monitor for?
What type of activity does HID primarily monitor for?
What is the benefit of using HID?
What is the benefit of using HID?
What is a ciphertext?
What is a ciphertext?
What is the purpose of the auditctl command?
What is the purpose of the auditctl command?
What is a rootkit?
What is a rootkit?
What is the purpose of the ebtables command?
What is the purpose of the ebtables command?
What does the ulimit command control in a Linux system?
What does the ulimit command control in a Linux system?
What is the purpose of the SSLStrictSNIVHostCheck configuration option in Apache HTTPD?
What is the purpose of the SSLStrictSNIVHostCheck configuration option in Apache HTTPD?
What is the purpose of the SSLRequestClientCert directive in Apache HTTPD?
What is the purpose of the SSLRequestClientCert directive in Apache HTTPD?
What is true about a Root CA certificate?
What is true about a Root CA certificate?
What is the best practice for implementing HID?
What is the best practice for implementing HID?
How are SELinux permissions related to standard Linux permissions?
How are SELinux permissions related to standard Linux permissions?
What command is used to set the owner and group of a file in Linux?
What command is used to set the owner and group of a file in Linux?
What is the purpose of an access control list in Linux?
What is the purpose of an access control list in Linux?
What is the purpose of the OCSP stapling mechanism?
What is the purpose of the OCSP stapling mechanism?
What is the purpose of the openvas-nvt-sync command?
What is the purpose of the openvas-nvt-sync command?
What is the purpose of a DNSKEY record in DNSSEC?
What is the purpose of a DNSKEY record in DNSSEC?
What is the purpose of AIDE?
What is the purpose of AIDE?
What is phishing?
What is phishing?
What is an X.509 Certificate?
What is an X.509 Certificate?
Which DNS record is used to map an IP address to a hostname?
Which DNS record is used to map an IP address to a hostname?
What is the purpose of DNS over TLS and DNS over HTTPS?
What is the purpose of DNS over TLS and DNS over HTTPS?
What is the purpose of a Certificate Revocation List (CRL)?
What is the purpose of a Certificate Revocation List (CRL)?
Which of the following statements is true about chroot environments?
Which of the following statements is true about chroot environments?
What is social engineering?
What is social engineering?
Which of the following information, within a DNSSEC-signed zone, is signed by the key signing key?
Which of the following information, within a DNSSEC-signed zone, is signed by the key signing key?
What happens when you run the command cryptsetup luksOpen /dev/sda1 crypt-vol?
What happens when you run the command cryptsetup luksOpen /dev/sda1 crypt-vol?
What is true about eCryptfs?
What is true about eCryptfs?
How does TSIG authenticate name servers?
How does TSIG authenticate name servers?
Which components are part of FreeIPA?
Which components are part of FreeIPA?
Which utility is used to generate keys for DNSSEC?
Which utility is used to generate keys for DNSSEC?
What is the purpose of the pam_cracklib PAM module?
What is the purpose of the pam_cracklib PAM module?
What makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
What makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
What is the purpose of IP sets in Linux?
What is the purpose of IP sets in Linux?
Which of the following is an example of a HID tool?
Which of the following is an example of a HID tool?
What does the X509 certificate contain?
What does the X509 certificate contain?
What is the purpose of an extended attribute in Linux?
What is the purpose of an extended attribute in Linux?
Which command is used to configure rkhunter?
Which command is used to configure rkhunter?
What is true about AppArmor and SELinux?
What is true about AppArmor and SELinux?
Which command disables the automatic password expiry for the user usera?
Which command disables the automatic password expiry for the user usera?
What is the purpose of the iptables command?
What is the purpose of the iptables command?
Which access control model is established by using SELinux?
Which access control model is established by using SELinux?
Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?
Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?
Which of the following namespaces are used in Linux Extended File Attributes?
Which of the following namespaces are used in Linux Extended File Attributes?
What is the purpose of TSIG in DNS?
What is the purpose of TSIG in DNS?
What is the purpose of privilege escalation?
What is the purpose of privilege escalation?
Study Notes
Mounting and Access Control
- The
uid
option inmount.cifs
specifies the user that appears as the local owner of files on a mounted CIFS share when the server does not provide ownership information. - The
setfacl
command is used to set access control lists (ACLs) on files.
Security and Encryption
- Private keys should be created on the systems where they will be used and should never leave them.
- Private keys should have a sufficient length for the algorithm used for key generation.
- A buffer overflow is a type of software vulnerability.
- A symmetric key is a key used for encryption and decryption that is the same.
- An asymmetric key is a key used for encryption that is different from the key used for decryption.
DNS and DNSSEC
- NSEC3 is used to prevent zone enumeration in DNSSEC.
- TSIG is used to sign DNS messages for secure communication.
- DNSSEC validation is performed on behalf of clients by a recursive name server.
System Security and Auditing
- The Linux Audit system is used to detect intrusions and system changes.
ausearch
is a command used to search and filter the audit log.setfattr
is a command used to set extended attributes on files.getfattr
is a command used to get extended attributes of files.
Network Security
- A honeypot is a network security tool designed to lure attackers into a trap.
- An IP set is a group of IP addresses and networks that can be referenced by netfilter rules.
- A man-in-the-middle attack is an attack that intercepts communications between two parties to steal information.
Certificates and Authentication
- A trust anchor is a root certificate that is trusted by a particular Certificate Authority (CA).
- A certificate chain is a sequence of certificates used to verify the authenticity of a digital certificate.
- OpenVPN uses ephemeral keys that are not written to the swap space.
Access Control and Security
- Mandatory Access Control (MAC) is established by using SELinux.
- The
chattr
command is used to set extended attributes on files. - The
getfacl
command is used to view the access control list of a file.### Linux Security and Administration - SELinux permissions are verified after standard Linux permissions
- The
chown
command is used to set the owner and group of a file in Linux - Wireshark capture filters include
port range 10000:tcp-15000:tcp
andtcp portrange 10000-15000
- The
openvas-nvt-sync
command is used to update NVTs from the OpenVAS NVT feed - The execute permission bit allows a file to be executed
Automated Scans
- Host scans can be automated on a Linux system using
cron
OpenSCAP
is not used to automate host scans
Access Control
- An access control list in Linux specifies fine-grained permissions for users and groups
- The purpose of an access control list is to specify permissions for users and groups
NFS Authentication
- Kerberos authentication was added to NFS in version 4
OCSP Stapling
- OCSP stapling is a mechanism that allows a server to provide proof of the revocation status of its own SSL/TLS certificate
FreeIPA Server
- The
ipa-server-install
command installs and configures a new FreeIPA server, including all sub-components, and creates a new FreeIPA domain
OpenSSL
- The
openssl req
command is used to generate a certificate signing request (CSR) using an existing private key
Cryptography
- Cryptography is the art of sending secret messages
- A ciphertext is the encrypted message
- A plaintext is the original message before encryption
HID (Host-based Intrusion Detection)
- HID monitors for unauthorized access attempts
- HID tools include security information and event management (SIEM) systems
Rootkits
- A rootkit is a type of malware that disguises itself as legitimate software
chkrootkit
is a tool used to check for rootkits on a Linux system
ebtables
- The
ebtables
command is used to display all ebtable rules contained in the table filter, including their packet and byte counters
Snort-stat
snort-stat
reads syslog files containing Snort information and generates port scan statistics
LUKS Devices
cryptsetup luksDelKey
is used to delete a key from a LUKS devicecryptsetup luksOpen
is used to open a LUKS device
eCryptfs
- eCryptfs is a stacked cryptographic filesystem for Linux
- eCryptfs does not store the contents of all files in an archive file similar to a tar file with an additional index to improve performance
Password Expiry
chage
is used to change the password expiry information for a userchage --maxdays none
disables password expiry for a user
TSIG
- TSIG authenticates name servers in order to perform secured zone transfers using a secret key that is shared between the servers
FreeIPA Components
- FreeIPA components include Kerberos KDC, Directory Server, and Public Key Infrastructure
- DHCP Server is not a component of FreeIPA
DNSSEC
dnssec-keygen
is used to generate keys for DNSSEC- DNSSEC is used to provide authentication and integrity of DNS data
- TSIG authenticates name servers in order to perform secured zone transfers using a shared secret key
X.509 Certificates
- An X.509 certificate contains information about the identity of a website
- A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA
HID Tools
- HID tools include security information and event management (SIEM) systems
- Antivirus software is not a type of HID tool
AppArmor and SELinux
- AppArmor and SELinux are both Linux security modules
- SELinux is a Linux kernel module, whereas AppArmor is implemented in user space only
- SELinux stores information in extended file attributes, whereas AppArmor does not maintain file-specific information and states
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Quiz about Linux security and file systems, including mounting CIFS shares and private key management.