Deck 17: Unix Linux Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 17: Unix Linux Vulnerabilities
1
In 1973, the developers of UNIX revised it by writing it in assembly language.
False
2
Linux source code is available free of cost, and some Linux distributions (distros) are also free.
True
3
A true command line interface (Terminal mode using tty1 through tty6) never goes into screen-saver mode.
True
4
UNIX and Linux systems use Trivial File Transfer Protocol, or TFTP, to start diskless computers.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
You cannot use the mutt package in conjunction with PGP.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Linux was derived from UNIX by an engineering student from Finland named ____ in 1991.
A)Ken Thompson
B)Steve Jobs
C)Linus Torvalds
D)Dennis Ritchie
A)Ken Thompson
B)Steve Jobs
C)Linus Torvalds
D)Dennis Ritchie
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
The first version of UNIX was written in ____ language.
A)C
B)Fortran
C)Lisp
D)assembly
A)C
B)Fortran
C)Lisp
D)assembly
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
To delete an account in Linux, use the following syntax:
A)eraseuser account_name
B)userdel account_name
C)del account_name
D)accountdel account_name
A)eraseuser account_name
B)userdel account_name
C)del account_name
D)accountdel account_name
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ utility can be used for finding strings within files.
A)grep
B)locate
C)find
D)subexpr
A)grep
B)locate
C)find
D)subexpr
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
The r utilities use an insecure mechanism called ____.
A)rsh
B)rlogin
C)rallow
D)rhosts
A)rsh
B)rlogin
C)rallow
D)rhosts
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ is the default and unchanging administrative user for UNIX/Linux systems.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
The ____________________ command helps users of a Linux operating system temporarily switch the current privileges available to those of the root account.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
Linux and UNIX-based operating systems use the sendmail daemon to send e-mail messages by employing ___________________________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
The ____________________ package allows system administrators to grant some or all root privileges to users listed in the sudoers text file.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
The wu-ftpd server allocates memory by using a function called ____________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are the basic exploits of a Linux system?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What can go wrong if every user of a Linux system has unlimited access to resources?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What are some of the Telnet service vulnerabilities?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck