Podcast
Questions and Answers
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
Where should private keys be created and stored?
Where should private keys be created and stored?
What is the primary purpose of NSEC3 in DNSSEC?
What is the primary purpose of NSEC3 in DNSSEC?
Which command is used to change the SELinux context for a user?
Which command is used to change the SELinux context for a user?
Signup and view all the answers
What is a key used for encryption that is different from the key used for decryption?
What is a key used for encryption that is different from the key used for decryption?
Signup and view all the answers
Which file is used to configure AIDE?
Which file is used to configure AIDE?
Signup and view all the answers
Which of the following is an example of a behavioral-based HID technique?
Which of the following is an example of a behavioral-based HID technique?
Signup and view all the answers
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
Signup and view all the answers
What is the purpose of ndpmon?
What is the purpose of ndpmon?
Signup and view all the answers
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Signup and view all the answers
What is an asymmetric key used for?
What is an asymmetric key used for?
Signup and view all the answers
Why should private keys have a sufficient length for the algorithm used for key generation?
Why should private keys have a sufficient length for the algorithm used for key generation?
Signup and view all the answers
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Signup and view all the answers
Which parameter to openssl s_client specifies the host name to use for TLS Server Name Indication?
Which parameter to openssl s_client specifies the host name to use for TLS Server Name Indication?
Signup and view all the answers
Which of the following lines in an OpenSSL configuration adds an X509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?
Which of the following lines in an OpenSSL configuration adds an X509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?
Signup and view all the answers
What is a buffer overflow?
What is a buffer overflow?
Signup and view all the answers
Which tool can be used to manage the Linux Audit system?
Which tool can be used to manage the Linux Audit system?
Signup and view all the answers
What is the difference between a SetUID and SetGID bit?
What is the difference between a SetUID and SetGID bit?
Signup and view all the answers
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
Signup and view all the answers
What is the purpose of the Linux Audit system?
What is the purpose of the Linux Audit system?
Signup and view all the answers
What is Linux Malware Detect?
What is Linux Malware Detect?
Signup and view all the answers
What is a Trojan?
What is a Trojan?
Signup and view all the answers
What is a rogue access point?
What is a rogue access point?
Signup and view all the answers
Which command is used to generate DNSSEC keys?
Which command is used to generate DNSSEC keys?
Signup and view all the answers
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
Signup and view all the answers
What is a DoS attack?
What is a DoS attack?
Signup and view all the answers
What is a trust anchor?
What is a trust anchor?
Signup and view all the answers
What is the purpose of getfacl?
What is the purpose of getfacl?
Signup and view all the answers
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?
Signup and view all the answers
Which of the following commands adds a new user to FreeIPA?
Which of the following commands adds a new user to FreeIPA?
Signup and view all the answers
What is the purpose of rkhunter?
What is the purpose of rkhunter?
Signup and view all the answers
What is a certificate chain?
What is a certificate chain?
Signup and view all the answers
Which of the following commands changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Which of the following commands changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Signup and view all the answers
What is the purpose of a Certificate Authority (CA)?
What is the purpose of a Certificate Authority (CA)?
Signup and view all the answers
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Signup and view all the answers
Which of the following DNS records are used in DNSSEC?
Which of the following DNS records are used in DNSSEC?
Signup and view all the answers
Which command is used to add users using SSSD’s local service?
Which command is used to add users using SSSD’s local service?
Signup and view all the answers
What is the primary purpose of a mechanism that allows a server to provide proof of its own identity to clients?
What is the primary purpose of a mechanism that allows a server to provide proof of its own identity to clients?
Signup and view all the answers
Which command is used to install and configure a new FreeIPA server?
Which command is used to install and configure a new FreeIPA server?
Signup and view all the answers
What is the purpose of a certificate signing request (CSR) in cryptography?
What is the purpose of a certificate signing request (CSR) in cryptography?
Signup and view all the answers
What is the primary goal of cryptography?
What is the primary goal of cryptography?
Signup and view all the answers
What type of activity does HID primarily monitor for?
What type of activity does HID primarily monitor for?
Signup and view all the answers
What is the benefit of using HID?
What is the benefit of using HID?
Signup and view all the answers
What is a ciphertext?
What is a ciphertext?
Signup and view all the answers
What is the purpose of the auditctl command?
What is the purpose of the auditctl command?
Signup and view all the answers
What is a rootkit?
What is a rootkit?
Signup and view all the answers
What is the purpose of the ebtables command?
What is the purpose of the ebtables command?
Signup and view all the answers
What does the ulimit command control in a Linux system?
What does the ulimit command control in a Linux system?
Signup and view all the answers
What is the purpose of the SSLStrictSNIVHostCheck configuration option in Apache HTTPD?
What is the purpose of the SSLStrictSNIVHostCheck configuration option in Apache HTTPD?
Signup and view all the answers
What is the purpose of the SSLRequestClientCert directive in Apache HTTPD?
What is the purpose of the SSLRequestClientCert directive in Apache HTTPD?
Signup and view all the answers
What is true about a Root CA certificate?
What is true about a Root CA certificate?
Signup and view all the answers
What is the best practice for implementing HID?
What is the best practice for implementing HID?
Signup and view all the answers
How are SELinux permissions related to standard Linux permissions?
How are SELinux permissions related to standard Linux permissions?
Signup and view all the answers
What command is used to set the owner and group of a file in Linux?
What command is used to set the owner and group of a file in Linux?
Signup and view all the answers
What is the purpose of an access control list in Linux?
What is the purpose of an access control list in Linux?
Signup and view all the answers
What is the purpose of the OCSP stapling mechanism?
What is the purpose of the OCSP stapling mechanism?
Signup and view all the answers
What is the purpose of the openvas-nvt-sync command?
What is the purpose of the openvas-nvt-sync command?
Signup and view all the answers
What is the purpose of a DNSKEY record in DNSSEC?
What is the purpose of a DNSKEY record in DNSSEC?
Signup and view all the answers
What is the purpose of AIDE?
What is the purpose of AIDE?
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
What is an X.509 Certificate?
What is an X.509 Certificate?
Signup and view all the answers
Which DNS record is used to map an IP address to a hostname?
Which DNS record is used to map an IP address to a hostname?
Signup and view all the answers
What is the purpose of DNS over TLS and DNS over HTTPS?
What is the purpose of DNS over TLS and DNS over HTTPS?
Signup and view all the answers
What is the purpose of a Certificate Revocation List (CRL)?
What is the purpose of a Certificate Revocation List (CRL)?
Signup and view all the answers
Which of the following statements is true about chroot environments?
Which of the following statements is true about chroot environments?
Signup and view all the answers
What is social engineering?
What is social engineering?
Signup and view all the answers
Which of the following information, within a DNSSEC-signed zone, is signed by the key signing key?
Which of the following information, within a DNSSEC-signed zone, is signed by the key signing key?
Signup and view all the answers
What happens when you run the command cryptsetup luksOpen /dev/sda1 crypt-vol?
What happens when you run the command cryptsetup luksOpen /dev/sda1 crypt-vol?
Signup and view all the answers
What is true about eCryptfs?
What is true about eCryptfs?
Signup and view all the answers
How does TSIG authenticate name servers?
How does TSIG authenticate name servers?
Signup and view all the answers
Which components are part of FreeIPA?
Which components are part of FreeIPA?
Signup and view all the answers
Which utility is used to generate keys for DNSSEC?
Which utility is used to generate keys for DNSSEC?
Signup and view all the answers
What is the purpose of the pam_cracklib PAM module?
What is the purpose of the pam_cracklib PAM module?
Signup and view all the answers
What makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
What makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
Signup and view all the answers
What is the purpose of IP sets in Linux?
What is the purpose of IP sets in Linux?
Signup and view all the answers
Which of the following is an example of a HID tool?
Which of the following is an example of a HID tool?
Signup and view all the answers
What does the X509 certificate contain?
What does the X509 certificate contain?
Signup and view all the answers
What is the purpose of an extended attribute in Linux?
What is the purpose of an extended attribute in Linux?
Signup and view all the answers
Which command is used to configure rkhunter?
Which command is used to configure rkhunter?
Signup and view all the answers
What is true about AppArmor and SELinux?
What is true about AppArmor and SELinux?
Signup and view all the answers
Which command disables the automatic password expiry for the user usera?
Which command disables the automatic password expiry for the user usera?
Signup and view all the answers
What is the purpose of the iptables command?
What is the purpose of the iptables command?
Signup and view all the answers
Which access control model is established by using SELinux?
Which access control model is established by using SELinux?
Signup and view all the answers
Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?
Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?
Signup and view all the answers
Which of the following namespaces are used in Linux Extended File Attributes?
Which of the following namespaces are used in Linux Extended File Attributes?
Signup and view all the answers
What is the purpose of TSIG in DNS?
What is the purpose of TSIG in DNS?
Signup and view all the answers
What is the purpose of privilege escalation?
What is the purpose of privilege escalation?
Signup and view all the answers
Study Notes
Mounting and Access Control
- The
uid
option inmount.cifs
specifies the user that appears as the local owner of files on a mounted CIFS share when the server does not provide ownership information. - The
setfacl
command is used to set access control lists (ACLs) on files.
Security and Encryption
- Private keys should be created on the systems where they will be used and should never leave them.
- Private keys should have a sufficient length for the algorithm used for key generation.
- A buffer overflow is a type of software vulnerability.
- A symmetric key is a key used for encryption and decryption that is the same.
- An asymmetric key is a key used for encryption that is different from the key used for decryption.
DNS and DNSSEC
- NSEC3 is used to prevent zone enumeration in DNSSEC.
- TSIG is used to sign DNS messages for secure communication.
- DNSSEC validation is performed on behalf of clients by a recursive name server.
System Security and Auditing
- The Linux Audit system is used to detect intrusions and system changes.
-
ausearch
is a command used to search and filter the audit log. -
setfattr
is a command used to set extended attributes on files. -
getfattr
is a command used to get extended attributes of files.
Network Security
- A honeypot is a network security tool designed to lure attackers into a trap.
- An IP set is a group of IP addresses and networks that can be referenced by netfilter rules.
- A man-in-the-middle attack is an attack that intercepts communications between two parties to steal information.
Certificates and Authentication
- A trust anchor is a root certificate that is trusted by a particular Certificate Authority (CA).
- A certificate chain is a sequence of certificates used to verify the authenticity of a digital certificate.
- OpenVPN uses ephemeral keys that are not written to the swap space.
Access Control and Security
- Mandatory Access Control (MAC) is established by using SELinux.
- The
chattr
command is used to set extended attributes on files. - The
getfacl
command is used to view the access control list of a file.### Linux Security and Administration - SELinux permissions are verified after standard Linux permissions
- The
chown
command is used to set the owner and group of a file in Linux - Wireshark capture filters include
port range 10000:tcp-15000:tcp
andtcp portrange 10000-15000
- The
openvas-nvt-sync
command is used to update NVTs from the OpenVAS NVT feed - The execute permission bit allows a file to be executed
Automated Scans
- Host scans can be automated on a Linux system using
cron
-
OpenSCAP
is not used to automate host scans
Access Control
- An access control list in Linux specifies fine-grained permissions for users and groups
- The purpose of an access control list is to specify permissions for users and groups
NFS Authentication
- Kerberos authentication was added to NFS in version 4
OCSP Stapling
- OCSP stapling is a mechanism that allows a server to provide proof of the revocation status of its own SSL/TLS certificate
FreeIPA Server
- The
ipa-server-install
command installs and configures a new FreeIPA server, including all sub-components, and creates a new FreeIPA domain
OpenSSL
- The
openssl req
command is used to generate a certificate signing request (CSR) using an existing private key
Cryptography
- Cryptography is the art of sending secret messages
- A ciphertext is the encrypted message
- A plaintext is the original message before encryption
HID (Host-based Intrusion Detection)
- HID monitors for unauthorized access attempts
- HID tools include security information and event management (SIEM) systems
Rootkits
- A rootkit is a type of malware that disguises itself as legitimate software
-
chkrootkit
is a tool used to check for rootkits on a Linux system
ebtables
- The
ebtables
command is used to display all ebtable rules contained in the table filter, including their packet and byte counters
Snort-stat
-
snort-stat
reads syslog files containing Snort information and generates port scan statistics
LUKS Devices
-
cryptsetup luksDelKey
is used to delete a key from a LUKS device -
cryptsetup luksOpen
is used to open a LUKS device
eCryptfs
- eCryptfs is a stacked cryptographic filesystem for Linux
- eCryptfs does not store the contents of all files in an archive file similar to a tar file with an additional index to improve performance
Password Expiry
-
chage
is used to change the password expiry information for a user -
chage --maxdays none
disables password expiry for a user
TSIG
- TSIG authenticates name servers in order to perform secured zone transfers using a secret key that is shared between the servers
FreeIPA Components
- FreeIPA components include Kerberos KDC, Directory Server, and Public Key Infrastructure
- DHCP Server is not a component of FreeIPA
DNSSEC
-
dnssec-keygen
is used to generate keys for DNSSEC - DNSSEC is used to provide authentication and integrity of DNS data
- TSIG authenticates name servers in order to perform secured zone transfers using a shared secret key
X.509 Certificates
- An X.509 certificate contains information about the identity of a website
- A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA
HID Tools
- HID tools include security information and event management (SIEM) systems
- Antivirus software is not a type of HID tool
AppArmor and SELinux
- AppArmor and SELinux are both Linux security modules
- SELinux is a Linux kernel module, whereas AppArmor is implemented in user space only
- SELinux stores information in extended file attributes, whereas AppArmor does not maintain file-specific information and states
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Quiz about Linux security and file systems, including mounting CIFS shares and private key management.