100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GSEC 401 Questions Part 1 Correctly Answered. $12.49   Add to cart

Exam (elaborations)

GSEC 401 Questions Part 1 Correctly Answered.

 0 view  0 purchase
  • Course
  • GSEC
  • Institution
  • GSEC

GSEC 401 Questions Part 1 Correctly Answered. What is $ - CORRECT ANSWER Hidden and admin share What is ./ - CORRECT ANSWER CLI for beginning to run an executable command in the current directory What is ./ configure - CORRECT ANSWER This is the new makefile usually have to type ./configur...

[Show more]

Preview 4 out of 45  pages

  • November 18, 2024
  • 45
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • gsec
  • GSEC
  • GSEC
avatar-seller
Nursewendo
GSEC 401 Questions Part 1 Correctly
Answered.
What is $ - CORRECT ANSWER Hidden and admin share



What is ./ - CORRECT ANSWER CLI for beginning to run an executable command in the current directory



What is ./ configure - CORRECT ANSWER This is the new makefile usually have to type ./configure as
most people don't have the current directory in their search path



What is / - CORRECT ANSWER Root file system top of the directory hierarchy



What is ./ configure &&make&&make install - CORRECT ANSWER •make = make would be executed, it
would look for the first target in Makefile and do what the instructions said. The expected end result
would be to build an executable program. •make install = This again invokes make, make finds the target
install in Makefile and files the directions to install the program.



What is /bin - CORRECT ANSWER location of executable programs, some SUID/SGID



What is /bin, /usr/bin, /usr/local, /opt - CORRECT ANSWER location of executable programs, some
SUID/SGID



What is /dev or /devices - CORRECT ANSWER location that contains devices files that programs running
on the system use to communicate with the physical hardware devices controlled by the OS kernel;
directory containing "files" used to talk to system devices



What is /dev/hda - CORRECT ANSWER HDA is first IDE HDD. SDA1 is 1st partition on that drive. 0-15



What is /dev/sda - CORRECT ANSWER Sda is the first SCSI HDD. SDA1 is the first partition. 0-15



What is /etc/aliases - CORRECT ANSWER file is used to contain mail aliases.

,What is /etc/default/useradd - CORRECT ANSWER Config file for password aging



What is /etc/fstab - CORRECT ANSWER File is used in most Linux/Windows to hold the static name-to-
address maps | Linux = /etc/hosts | Windows = %\systemroot%\system32\drivers\etc\hosts and
lmhosts



What is /etc/hosts - CORRECT ANSWER File is used in most Linux/Windows to hold the static name-to-
address maps | Linux = /etc/hosts | Windows = %\systemroot%\system32\drivers\etc\hosts and
lmhosts



What is /etc/init.d - CORRECT ANSWER directory where control scripts are stored; The initialization
scripts used during system startup can also be used to startup services individually. These are located in
the /etc/init.d directories, and can be used to (re)launch services using the following syntax: #
/etc/init.d/<script name> start



What is /etc/inittab - CORRECT ANSWER Lists each of the init processes the system should start at boot
and stop at shutdown



What is /etc/login.defs - CORRECT ANSWER Config files for password aging



What is /etc/logrotate.conf - CORRECT ANSWER moves log files to keep from over filling log space



What is /etc/named.conf - CORRECT ANSWER (if it exists) is the configuration file for the local name
service cache



What is /etc/pam.d - CORRECT ANSWER Location of all PAM configuration files



What is /etc/pam.d/system-auth - CORRECT ANSWER used to enforce passwords strength and reuse
restrictions

,What is /etc/passwd - CORRECT ANSWER Today's Linux environment uses a two file system -
/etc/passwd and /etc/shadow; passwords are not stored in /etc/shadow/; shadow file only accessible by
root



What is /etc/resolv.conf - CORRECT ANSWER tells the host in which order to attempt to resolve names



What is /etc/security/opasswd - CORRECT ANSWER file created to restrict use of previous passwords



What is /etc/services - CORRECT ANSWER Mapping of services to port. Works with inetd.conf



What is /etc/shadow - CORRECT ANSWER Today's Linux environment uses a two file system -
/etc/passwd and /etc/shadow; passwords are not stored in /etc/shadow/; shadow file only accessible by
root



What is /etc/xinetd.conf - CORRECT ANSWER Global xinetd configuratio file. Read-only once the xinet
service is started.



What is /export/home, /home - CORRECT ANSWER user home directories.



What is /home - CORRECT ANSWER user home directories



What is /opt - CORRECT ANSWER executable programs, some SUID/SGID



What is /sbin - CORRECT ANSWER Contains system binary files



What is /usr - CORRECT ANSWER Most of the critical components of the OS live, including system
binaries, programming libraries and tools, and on-line documentation; Ready-Only unless OS is upgraded
or patches installed. Files should be protected.



What is /usr/bin - CORRECT ANSWER executable programs, some SUID/SGID

, What is /usr/local - CORRECT ANSWER executable programs, some SUID/SGID



What is /usr/sbin - CORRECT ANSWER Contains system binary files.



What is /var - CORRECT ANSWER Systems keeps frequent changing data, such as log files and temp
queues for system services like email



What is /var/log/secure - CORRECT ANSWER Activities related to the use of the su command are
authentication types of activities, where the user must authenticate themselves to the system before
being allowed to switch users. Authentication activities are logged under the rules associated with the
"auth" and "authpriv" facilities in the syslog.conf file. Based on this syslog.conf file, the "authpriv" facility
messages are supposed to be sent to /var/log/secure.



What is | - CORRECT ANSWER Piping use; Piping command output into another command as input.



What is > - CORRECT ANSWER Creating output files



What is3 roles of SSL - CORRECT ANSWER •Encryption, •Server ID Verification, •Data Integrity; (SSL uses
port 443)



What is 3DES - CORRECT ANSWER used to overcome the weakness of short key length of DES and meet
in the middle attack of double DES; executes 48 rounds 168 bit key length (168 bit - 3 keys)



What is 5 Vulnerability Axioms(General Truths) - CORRECT ANSWER •1.) Vulnerabilities are the gateways
through which threats are manifested. •2.) Scans without remediation have little value. •3.) Little
scanning and remediation is better than a lot scanning and no remediation. •4.) Prioritizing is critical.
•5.) Stay on track.



What is 6 Step Process for Incident Handling - CORRECT ANSWER •1.) Preparation •2.) Identification •3.)
Containment •4.) Eradication •5.) Recovery •6.) Lessons Learned

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursewendo. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart