Exam 19: Securing Linux

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Buffer overflow attacks have become less prevalent with the growth of the Internet.

(True/False)
4.8/5
(31)

You use the ____ command to specify default file and directory permissions, which can have a major impact on a server's security when files are created.

(Multiple Choice)
4.9/5
(37)

Describe one method to secure NFS.

(Essay)
4.9/5
(28)

Given the sample file permission mask, AAABBBCCCDDD, which bits represents read, write, and execute permissions for a group, with the same octal values as for user permissions?

(Multiple Choice)
4.8/5
(33)

A computer cannot be completely safeguarded from DoS attacks.

(True/False)
4.8/5
(26)

A(n) ____________________ is a program that captures and views packets as they're transmitted over a network.

(Short Answer)
4.9/5
(30)

____________________ developed by Wietse Venema, is a widely used tool that logs connections and is used to allow or deny access to network services.

(Short Answer)
4.7/5
(27)

Explain why you would use the ps -aux command.

(Essay)
4.9/5
(44)

How are Common Gateway Interface (CGI) script intrusions implemented and prevented?

(Essay)
4.8/5
(29)

Match each statement with an item -Allows users to transfer files across a network with FTP.

(Multiple Choice)
4.8/5
(38)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)