Exam 17: Unix/Linux Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The r utilities use an insecure mechanism called ____.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

D

Linux source code is available free of cost, and some Linux distributions (distros) are also free.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

Linux and UNIX-based operating systems use the sendmail daemon to send e-mail messages by employing ___________________________________.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol
SMTP

What are the basic exploits of a Linux system?

(Essay)
4.8/5
(39)

You cannot use the mutt package in conjunction with PGP.

(True/False)
4.8/5
(44)

In 1973, the developers of UNIX revised it by writing it in assembly language.

(True/False)
4.8/5
(37)

To delete an account in Linux, use the following syntax:

(Multiple Choice)
4.8/5
(36)

What are some of the Telnet service vulnerabilities?

(Essay)
4.9/5
(32)

The ____________________ package allows system administrators to grant some or all root privileges to users listed in the sudoers text file.

(Short Answer)
4.9/5
(34)

Linux was derived from UNIX by an engineering student from Finland named ____ in 1991.

(Multiple Choice)
4.8/5
(31)

A true command line interface (Terminal mode using tty1 through tty6) never goes into screen-saver mode.

(True/False)
4.8/5
(26)

The ____ utility can be used for finding strings within files.

(Multiple Choice)
4.8/5
(40)

The ____________________ command helps users of a Linux operating system temporarily switch the current privileges available to those of the root account.

(Short Answer)
4.8/5
(34)

The wu-ftpd server allocates memory by using a function called ____________________.

(Short Answer)
4.8/5
(30)

The first version of UNIX was written in ____ language.

(Multiple Choice)
4.8/5
(45)

____________________ is the default and unchanging administrative user for UNIX/Linux systems.

(Short Answer)
4.8/5
(34)

UNIX and Linux systems use Trivial File Transfer Protocol, or TFTP, to start diskless computers.

(True/False)
4.9/5
(35)

What can go wrong if every user of a Linux system has unlimited access to resources?

(Essay)
4.8/5
(28)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)