100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIST 2601 All Quizzes With Verified Study Questions And Answers 2024 Updates $12.49   Add to cart

Exam (elaborations)

CIST 2601 All Quizzes With Verified Study Questions And Answers 2024 Updates

 2 views  0 purchase
  • Course
  • CIST 2601
  • Institution
  • CIST 2601

CIST 2601 All Quizzes With Verified Study Questions And Answers 2024 Updates

Preview 2 out of 9  pages

  • August 10, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • cist 2601 all quizzes
  • cist 2601
  • CIST 2601
  • CIST 2601
avatar-seller
Nipsey
CIST 2601 All Quizzes With Verified Study Questions
And Answers 2024 Updates
Minux was the basis for Unix, which was the basis for Multics, which was the basis for Linux. ANS False



A kernel, a userland, graphical interface, and package management are the main components of a Linux distributin.
ANS True



Two main features of open source software are 1) you can actually see how the code works, and 2) you can make
changes to the existing code if you know how and you need slightly different functionality. ANS True



Open source software bugs are often fixed faster than with closed source software maintained by a large
corporation, and the open source fix usually has a higher degree of documentation and testing (as opposed to close
source software). ANS False



Most Linux distributions are not pre-compiled and you are encouraged to make your own customizations before
installing Linux. ANS False



The "I" in the CIA triangle refers only to malicious acts that can cause damage or incorrect changes to your data.
ANS False



Most Linux distributions that have both a client and server version different primarily in the number and type of
packages that are installed by default. ANS True



The Tripwire application is used to monitor system and application software (i.e. to see if the software has been
altered in any way). ANS True



A computer running Linux cannot be configured to function as a network firewall. ANS False



IPSec is a protocol used for IP traffic and supports the encryption of VPN communications passing through a Linux
firewall. ANS True



A monolithic kernel is a large executable program that contains the main functionality of an operating system.
ANS True

, The Linux sysctl command can be used to make real-time changes to the kernel (i.e. without have to recompile the
kernel). ANS True



A Linux live CD can be used to boot a Linux machine and bypass many of the security controls installed on the hard-
drive Linux installation. ANS True



GRUB is a Linux utility designed to help you decide which operating system you want to boot (assuming multiple
boot options exists on a particular machine). The grub utility can also be configured to allow you to make
adjustments to the operating system before it boots. ANS True



Most Linux security issues are within the applications or services that run on top of the kernal. ANS True



The /etc/init.d folder contains scripts that will control what services are loaded during the startup process. ANS
True



The Linux NIS and LDAP authentication databases are designed to operate at a local level, while the the shadow
password suite was designed to do authentication at a network level. ANS False



Discretionary Access Controls are designed to control individual access to a resource at the discretion of the
resource owner, while Mandatory Access Controls are designed to be resource-centric and apply to all users equally
or will be based on the user's classification matching the classification of the resource. ANS True



The Linux iptables command is designed to create a software-based firewall. ANS True



A strength of the Telnet and FTP services is that data data is encrypted during transmission. ANS False



A Linux package is a set of related programs that provide specific and additional functionality to the standard Linux
kernel. ANS True



Fedora is the development version of Red Hat, while RHEL is the Enterprise platform for Red Hat. ANS True



Centos is based on Debian Linux while Ubuntu is based on Red Hat. ANS False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nipsey. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80796 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart