Exam 17: Unix/Linux Vulnerabilities
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
The r utilities use an insecure mechanism called ____.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
D
Linux source code is available free of cost, and some Linux distributions (distros) are also free.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
Linux and UNIX-based operating systems use the sendmail daemon to send e-mail messages by employing ___________________________________.
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol
SMTP
In 1973, the developers of UNIX revised it by writing it in assembly language.
(True/False)
4.8/5
(37)
The ____________________ package allows system administrators to grant some or all root privileges to users listed in the sudoers text file.
(Short Answer)
4.9/5
(34)
Linux was derived from UNIX by an engineering student from Finland named ____ in 1991.
(Multiple Choice)
4.8/5
(31)
A true command line interface (Terminal mode using tty1 through tty6) never goes into screen-saver mode.
(True/False)
4.8/5
(26)
The ____ utility can be used for finding strings within files.
(Multiple Choice)
4.8/5
(40)
The ____________________ command helps users of a Linux operating system temporarily switch the current privileges available to those of the root account.
(Short Answer)
4.8/5
(34)
The wu-ftpd server allocates memory by using a function called ____________________.
(Short Answer)
4.8/5
(30)
____________________ is the default and unchanging administrative user for UNIX/Linux systems.
(Short Answer)
4.8/5
(34)
UNIX and Linux systems use Trivial File Transfer Protocol, or TFTP, to start diskless computers.
(True/False)
4.9/5
(35)
What can go wrong if every user of a Linux system has unlimited access to resources?
(Essay)
4.8/5
(28)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)