DistributedNetworks
SiteMap
Configure Linux Items
Linux Admin
System Admin
Host Security
«Prev
Next»
Redhat Linux
Host Security
Security Console Access
Network Security Access
Crackers Sniffing Passwords
Securing Compromised System
Detecting Crackers Attacks
Insecure Remote Login
Secure Remote Login
Controlling Root Login
Secure TTY
Sudo Linux-command
Finding mod Sticky Files
Running Automated Checks
Red Hat Package Manager
Reading RPM Output
Verify RPM Package Integrity
Port Scan Conclusion
Process User Accounting
Process Accounting
Process Auditing
Internet Services
Internet Protocol Conclusion
Standalone Transient Servers
Network File Services
NFS Security
Mount NFS
NFS Troubleshooting
Network File System
Samba Server
Understanding Samba
Samba Server - Configuration
Linux Mars
Samba - Quiz
Internet Email
Security Module - Quiz
Each question is worth one point. Select the best answer for each question.
1.
Which of the following may create security holes within your system?
Please select all the correct answers.
A.
telnet
B.
scp
C.
ftp
D.
netstat
2.
Who, of the following users, would a system administrator give limited root access to via the
sudo
command?
Please select all the correct answers.
A.
Lab instructors who need to periodically reboot machines
B.
Programmers who need to access another programmer's files
C.
Team leaders who need toadd new users to their system
D.
Testers who need to be able to execute root commands for a limited amount of time
3.
Which of the following are common utilities used to determine if if your system has been compromised?
Please select the best answer.
A.
finger
,
netstat
,
ps
,
rlogin
B.
finger
,
netstat
,
ps
,
who
,
ps
C.
finger
,
ps
,
rexec
,
who
D.
finger
,
ps
,
rexec
,
rlogin