DispersedNet
SiteMap
Configure Linux Items
Linux Admin
System Admin
Host Security
«Prev
Next»
Redhat Linux
Host Security
Security Console Access
Network Security Access
Crackers Sniffing Passwords
Securing Compromised System
Steps Compromised System
Detecting Crackers Attacks
Insecure Remote Login
Secure Remote Login
Remote Login Access
Shell Copy Program
Controlling Root Login
Sudo Linux-command
Finding mod Sticky Files
Running Automated Checks
Red Hat Package Manager
Reading RPM Output
Verify RPM Package Integrity
Port Scan Conclusion
Process User Accounting
System Accounting
Process Accounting
Process Auditing
Examining System Logs
Red Hat User Auditing
Auditing Logfiles
Auditing Conclusion
Internet Services
Internet Protocol Properties
IP Addresses Explained
TCP UDP Protocols
Define Port-numbers
Port Names Numbers
Configure Port Names
Domain Name System
Standalone Transient Server
Standalone Transient Servers
Internet Protocol Conclusion
Network File Services
Network File System
Remote Procedure Call
Configure NFS Sserver
NFS Security
NFS File System
Mount NFS
Automount FNS
NFS Troubleshooting
NFS Linux Conclusion
Samba Server
Understanding Samba
Samba Server - Configuration
Linux Mars
Samba - Quiz
Internet Email
Using Procmail
Configure Procmail
Security Module - Quiz
Each question is worth one point. Select the best answer for each question.
1.
Which of the following may create security holes within your system?
Please select all the correct answers.
A.
telnet
B.
scp
C.
ftp
D.
netstat
2.
Who, of the following users, would a system administrator give limited root access to via the
sudo
command?
Please select all the correct answers.
A.
Lab instructors who need to periodically reboot machines
B.
Programmers who need to access another programmer's files
C.
Team leaders who need toadd new users to their system
D.
Testers who need to be able to execute root commands for a limited amount of time
3.
Which of the following are common utilities used to determine if if your system has been compromised?
Please select the best answer.
A.
finger
,
netstat
,
ps
,
rlogin
B.
finger
,
netstat
,
ps
,
who
,
ps
C.
finger
,
ps
,
rexec
,
who
D.
finger
,
ps
,
rexec
,
rlogin