100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
LINUX SECURITY 1ST IN-CLASS EXAM, LINUX SECURITY IN CLASS EXAM 2 $10.99   Add to cart

Exam (elaborations)

LINUX SECURITY 1ST IN-CLASS EXAM, LINUX SECURITY IN CLASS EXAM 2

 1 view  0 purchase
  • Course
  • LINUX SECURITY
  • Institution
  • LINUX SECURITY

LINUX SECURITY 1ST IN-CLASS EXAM, LINUX SECURITY IN CLASS EXAM 2

Preview 2 out of 6  pages

  • September 18, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • LINUX SECURITY
  • LINUX SECURITY
avatar-seller
GEEKA
LINUX SECURITY 1ST IN-CLASS EXAM, LINUX
SECURITY IN CLASS EXAM 2
One benefit of open source code is the ability to learn what the code does and how the
program operates. - Answers -True

Open source code in an online software repository cannot be altered by an attacker. -
Answers -False

Mint is a derivative of the Debian distribution. - Answers -True

All packages in a source-based distribution of Linux must be compiled from source -
Answers -True

The C-I-A triad is an expansion of the Parkerian hexad. - Answers -False

The package-management system in Linux is used to restrict permissions on files and
folders. - Answers -False

The Linux open source license allows anyone to use, modify, and improve the source
code. - Answers -True

Open source code rarely comes with an associated cryptographic hash. - Answers -
False

Most Linux distributions currently use a package called ipchains as firewall software. -
Answers -False

The process of fixing commercial software is typically less constrained by human
resource issues than open source software projects. - Answers -False

In a Linux system, a smaller number of packages means a smaller surface area for
attack. - Answers -True

A black-hat hacker is someone who performs attacks against victims for malicious
purposes. - Answers -True

The C-I-A triad is the core and defining set of concepts with respect to information
security. - Answers -True

Source-based distributions of Linux enable you to decide how many packages you want
to include in it. - Answers -True

Transmission Control Protocol (TCP) is a protocol and service for synchronizing clocks
across systems on a network. - Answers -False

, The init process is the super process that is responsible for starting all processes other
than those specified by the runlevel during system startup. - Answers -True

Without proper controls in place, an attacker who gets access to a host system can
make changes to any virtual machine on that host. - Answers -True

Malware written for Windows graphical user interface (GUI) applications may affect
Linux GUI applications. - Answers -False

A hypervisor is a software interface designed specifically for virtual machines with
limited resources. - Answers -False

SELinux and AppArmor provide mandatory access controls. - Answers -True

Because administrators can configure a system to display graphical user interface (GUI)
clients on a remote terminal, malware on one Linux GUI application can spread across
a network to other GUI systems. - Answers -True

The graphical user interface (GUI) is beyond the basic Linux operating system. -
Answers -True

A virtual machine must be periodically updated just like any other system. - Answers -
True

The Linux startup process begins automatically after the boot process loads the Linux
kernel. - Answers -True

Samba can be configured to authenticate to a Windows Active Directory server. -
Answers -True

LILO is the default boot loader for Ubuntu, Red Hat, and many other Linux distributions.
- Answers -False

The sendmail e-mail service and the commercial SMTP server known as Sendmail are
two different entities. - Answers -True

Iptables cannot perform network address translation - Answers -False

Access control lists (ACLs) provide a layer of discretionary access control - Answers -
True

Using nonstandard Transmission Control Protocol/Internet Protocol (TCP/IP) suite port
numbers for key services can slow the efforts of attackers who want to break into a
system. - Answers -True

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart