Exam 19: Securing Linux

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The OpenSSH daemon is ____.

(Multiple Choice)
4.8/5
(32)

Describe the two steps an NFS client can use to access files on a remote NFS server.

(Essay)
4.9/5
(33)

Explain how packet sniffers can be used for both good and bad.

(Essay)
4.9/5
(33)

The htpasswd command is installed by default.

(True/False)
4.9/5
(34)

Session hijacking is a specialized form of ____ in which a hijacker gets unauthorized control of a network session.

(Multiple Choice)
4.8/5
(40)

Compare brute-force attacks and dictionary attacks.

(Essay)
4.8/5
(34)

When put in ____ mode, a NIC receives all packets on a network, including packets destined for other computers.

(Multiple Choice)
4.8/5
(33)

In a(n) ____________________, data that has exceeded a buffer's storage capacity overflows into another buffer.

(Short Answer)
4.7/5
(38)

____ attacks involve overloading a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services.

(Multiple Choice)
4.9/5
(28)

Intranets are private ____ for transmitting data only inside the internal network.

(Multiple Choice)
4.8/5
(43)

Match each statement with an item -Allows users to print jobs on a print server.

(Multiple Choice)
4.8/5
(38)

All processes running on a computer must be monitored periodically with the ____ command to check for rogue or malfunctioning processes.

(Multiple Choice)
4.8/5
(35)

Match each statement with an item -Sends identical received characters back to the sender.

(Multiple Choice)
4.8/5
(28)

What is the daemon for running Apache Web Server?

(Multiple Choice)
4.7/5
(40)

Match each statement with an item -Allows users to log in to remote computers and interact with them via a terminal window.

(Multiple Choice)
4.8/5
(37)

Match each statement with an item -Gives information about local computers or users to remote computers.

(Multiple Choice)
4.8/5
(38)

Packet sniffers are ____ and don't generate much traffic.

(Multiple Choice)
4.9/5
(37)

____________________ (CGI) scripts are used to generate a dynamic Web page's contents and can be written in a number of programming languages, such as Java, C, and Perl.

(Short Answer)
4.7/5
(44)

A ____ attack is a simple attack in which ICMP Echo Request packets are sent to a victim, who continues to send packets in response, effectively choking available bandwidth.

(Multiple Choice)
4.8/5
(32)

Files and file system security are the most important aspects of data security.

(True/False)
4.9/5
(27)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)