GSEC 401 Questions Part 1 Correctly Answered.
What is $ - CORRECT ANSWER Hidden and admin share
What is ./ - CORRECT ANSWER CLI for beginning to run an executable command in the current directory
What is ./ configure - CORRECT ANSWER This is the new makefile usually have to type ./configur...
GSEC 401 Questions Part 1 Correctly
Answered.
What is $ - CORRECT ANSWER Hidden and admin share
What is ./ - CORRECT ANSWER CLI for beginning to run an executable command in the current directory
What is ./ configure - CORRECT ANSWER This is the new makefile usually have to type ./configure as
most people don't have the current directory in their search path
What is / - CORRECT ANSWER Root file system top of the directory hierarchy
What is ./ configure &&make&&make install - CORRECT ANSWER •make = make would be executed, it
would look for the first target in Makefile and do what the instructions said. The expected end result
would be to build an executable program. •make install = This again invokes make, make finds the target
install in Makefile and files the directions to install the program.
What is /bin - CORRECT ANSWER location of executable programs, some SUID/SGID
What is /bin, /usr/bin, /usr/local, /opt - CORRECT ANSWER location of executable programs, some
SUID/SGID
What is /dev or /devices - CORRECT ANSWER location that contains devices files that programs running
on the system use to communicate with the physical hardware devices controlled by the OS kernel;
directory containing "files" used to talk to system devices
What is /dev/hda - CORRECT ANSWER HDA is first IDE HDD. SDA1 is 1st partition on that drive. 0-15
What is /dev/sda - CORRECT ANSWER Sda is the first SCSI HDD. SDA1 is the first partition. 0-15
What is /etc/aliases - CORRECT ANSWER file is used to contain mail aliases.
,What is /etc/default/useradd - CORRECT ANSWER Config file for password aging
What is /etc/fstab - CORRECT ANSWER File is used in most Linux/Windows to hold the static name-to-
address maps | Linux = /etc/hosts | Windows = %\systemroot%\system32\drivers\etc\hosts and
lmhosts
What is /etc/hosts - CORRECT ANSWER File is used in most Linux/Windows to hold the static name-to-
address maps | Linux = /etc/hosts | Windows = %\systemroot%\system32\drivers\etc\hosts and
lmhosts
What is /etc/init.d - CORRECT ANSWER directory where control scripts are stored; The initialization
scripts used during system startup can also be used to startup services individually. These are located in
the /etc/init.d directories, and can be used to (re)launch services using the following syntax: #
/etc/init.d/<script name> start
What is /etc/inittab - CORRECT ANSWER Lists each of the init processes the system should start at boot
and stop at shutdown
What is /etc/login.defs - CORRECT ANSWER Config files for password aging
What is /etc/logrotate.conf - CORRECT ANSWER moves log files to keep from over filling log space
What is /etc/named.conf - CORRECT ANSWER (if it exists) is the configuration file for the local name
service cache
What is /etc/pam.d - CORRECT ANSWER Location of all PAM configuration files
What is /etc/pam.d/system-auth - CORRECT ANSWER used to enforce passwords strength and reuse
restrictions
,What is /etc/passwd - CORRECT ANSWER Today's Linux environment uses a two file system -
/etc/passwd and /etc/shadow; passwords are not stored in /etc/shadow/; shadow file only accessible by
root
What is /etc/resolv.conf - CORRECT ANSWER tells the host in which order to attempt to resolve names
What is /etc/security/opasswd - CORRECT ANSWER file created to restrict use of previous passwords
What is /etc/services - CORRECT ANSWER Mapping of services to port. Works with inetd.conf
What is /etc/shadow - CORRECT ANSWER Today's Linux environment uses a two file system -
/etc/passwd and /etc/shadow; passwords are not stored in /etc/shadow/; shadow file only accessible by
root
What is /etc/xinetd.conf - CORRECT ANSWER Global xinetd configuratio file. Read-only once the xinet
service is started.
What is /export/home, /home - CORRECT ANSWER user home directories.
What is /home - CORRECT ANSWER user home directories
What is /opt - CORRECT ANSWER executable programs, some SUID/SGID
What is /sbin - CORRECT ANSWER Contains system binary files
What is /usr - CORRECT ANSWER Most of the critical components of the OS live, including system
binaries, programming libraries and tools, and on-line documentation; Ready-Only unless OS is upgraded
or patches installed. Files should be protected.
What is /usr/bin - CORRECT ANSWER executable programs, some SUID/SGID
, What is /usr/local - CORRECT ANSWER executable programs, some SUID/SGID
What is /usr/sbin - CORRECT ANSWER Contains system binary files.
What is /var - CORRECT ANSWER Systems keeps frequent changing data, such as log files and temp
queues for system services like email
What is /var/log/secure - CORRECT ANSWER Activities related to the use of the su command are
authentication types of activities, where the user must authenticate themselves to the system before
being allowed to switch users. Authentication activities are logged under the rules associated with the
"auth" and "authpriv" facilities in the syslog.conf file. Based on this syslog.conf file, the "authpriv" facility
messages are supposed to be sent to /var/log/secure.
What is | - CORRECT ANSWER Piping use; Piping command output into another command as input.
What is > - CORRECT ANSWER Creating output files
What is3 roles of SSL - CORRECT ANSWER •Encryption, •Server ID Verification, •Data Integrity; (SSL uses
port 443)
What is 3DES - CORRECT ANSWER used to overcome the weakness of short key length of DES and meet
in the middle attack of double DES; executes 48 rounds 168 bit key length (168 bit - 3 keys)
What is 5 Vulnerability Axioms(General Truths) - CORRECT ANSWER •1.) Vulnerabilities are the gateways
through which threats are manifested. •2.) Scans without remediation have little value. •3.) Little
scanning and remediation is better than a lot scanning and no remediation. •4.) Prioritizing is critical.
•5.) Stay on track.
What is 6 Step Process for Incident Handling - CORRECT ANSWER •1.) Preparation •2.) Identification •3.)
Containment •4.) Eradication •5.) Recovery •6.) Lessons Learned
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursewendo. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.