Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

FedVTE- Linux Operating System Security Exam Questions and Answers, Exams of Nursing

A set of questions and answers related to linux operating system security. It covers various aspects of security, including file system security, user management, network security, and system hardening. Useful for students and professionals who are learning about linux security.

Typology: Exams

2024/2025

Available from 02/07/2025

smart-scores
smart-scores 🇺🇸

5

(2)

7.4K documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
FedVTE- Linux Operating System Security exam
questions with answers
εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ ⪛⪴⪴⪷⪱⪘⪞⪴⪸
εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ ⪛⪴⪴⪷⪱⪘⪞⪴⪸
εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ ⪛⪴⪴⪷⪱⪘⪞⪴⪸
What program could you use on a Linux system to securely copy files to a Linux
host running the SSH server daemon? - correct answer SCP
Single user mode in Linux is a security risk if a malicious actor has physical
access to the host - correct answer True
srm is a tool used to securely delete files from the file system - correct answer
True
What software installation package format is used on Red Hat? - correct answer
DPKG (?)
With IPTables what default policy should be used for packets for maximum
security? - correct answer DROP
IPSec PPTP and SSL are all examples of: - correct answer VPNs
A BASH script must be compiled into an executable object in order to run. -
correct answer False
You can use SSH to tunnel and encrypt traffic between a client and a server. -
correct answer True
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
pf3
pf4
pf5

Partial preview of the text

Download FedVTE- Linux Operating System Security Exam Questions and Answers and more Exams Nursing in PDF only on Docsity!

FedVTE- Linux Operating System Security exam

questions with answers

⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ

What program could you use on a Linux system to securely copy files to a Linux

host running the SSH server daemon? - correct answer ✔SCP

Single user mode in Linux is a security risk if a malicious actor has physical

access to the host - correct answer ✔True

srm is a tool used to securely delete files from the file system - correct answer

✔True

What software installation package format is used on Red Hat? - correct answer

✔DPKG (?)

With IPTables what default policy should be used for packets for maximum

security? - correct answer ✔DROP

IPSec PPTP and SSL are all examples of: - correct answer ✔VPNs

A BASH script must be compiled into an executable object in order to run. -

correct answer ✔False

You can use SSH to tunnel and encrypt traffic between a client and a server. -

correct answer ✔True

chroot confines a process to a specific directory - correct answer ✔True

GID UID and EUID stand for: - correct answer ✔Group User and Effective User

Identification numbers

What is Unified Extensible Firmware Interface designed to do? - correct answer

✔Prevent malicious actors from modifying the boot loader or booting the

computer with a different operating system

Which of the following are package management programs which install or

update or remove packages on a Linux system? - correct answer ✔All

2003:da3:1637:ffff:ffff:ffff:ffff:ffff is an example of what type of address? -

correct answer ✔IPv

Bro, Snort, Suricata are examples of what kind of Linux security feature? -

correct answer ✔Network Intrusion Detection Systems

In addition to the internal authentication via /etc/passwd and /etc/shadow

files, what services can be used to authenticate users to a Linux host? - correct

answer ✔Fedora Directory Service (?)

What program could you use to create or edit a Linux BASH script? - correct

answer ✔All of the above

What program should be used to change a user password? - correct answer

✔passwd

What base directory would you put a script in if you wanted it to automatically

start when the operating system starts? - correct answer ✔/etc/rc.d

Regularly reviewing user accounts on a system and disable old unused accounts

is a good step to take in hardening a system. - correct answer ✔True

RPM will check for dependencies and install them when installing a program. -

correct answer ✔True

Which documents or resources can you review for guidance on hardening a

Linux system: - correct answer ✔All of these

What tool is used to perform automated installs of Red Hat Linux? - correct

answer ✔Kickstart

To quickly deny a user access to the system set their login shell to /bin/false. -

correct answer ✔True

Which command could you use to update software on a Linux host? - correct

answer ✔Both apt-get upgrade and yum update

What programs could you use to remotely interact with a Linux system? -

correct answer ✔All

Which of the following is not a security misconfiguration on Linux? - correct

answer ✔Setting a GRUB password

Package repositories are collections of software and source files used by

package management systems to install, update, and remove software on a

Linux system. - correct answer ✔True

When hardening a Linux system you should consider doing the following -

correct answer ✔All of the above

In a hardened Linux environment the firewalls default policy should be - correct

answer ✔Deny All (or Drop)

What does the command find / -xdev -nouser do? - correct answer ✔Finds files

that belong to user accounts that are no longer on the system

127.0.0.1 is an example of what type of address? - correct answer ✔IPv

What Linux security feature can be used to log, drop, reject, or alter packets? -

correct answer ✔IPTables

Scripting is a good way to automate manual or time intensive tasks such as

backups or running programs on a scheduled basis or monitoring and checking

system settings. - correct answer ✔True

What program allows you to interactively execute programs or commands as

the root user? - correct answer ✔sudo

Which file in Linux tells the system which DNS server to use? - correct answer

✔/etc/resolv.conf