Develop An Account Security Policy Verified Test Bank Ch.8 - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.

Develop An Account Security Policy Verified Test Bank Ch.8

Linux Essentials for Cybersecurity (Rothwell/Kinsey)

Chapter 8 Develop an Account Security Policy

1) After you install Kali Linux, you can access the security tools by clicking __________ at the top of the window.

A) Applications

B) Places

C) Files

D) Tools

2) Which of the following is not one of the categories of Kali Linux tools?

A) Password Attacks

B) Vulnerability Analysis

C) Pre Exploitation

D) Reverse Engineering

3) A good security policy should include all but which of the following?

A) A set of rules that determines what is and is not allowed on systems

B) A means to ensure that all rules are being followed

C) A well-defined plan to handle when a system is compromised

D) A way to ensure that policies remain stable as new information becomes available

4) When a system is compromised, which of the following should include who is notified, what actions should be taken, and so on?

A) Reporting tools

B) Incident response plan

C) Web application analysis

D) Social engineering tools

5) When securing user accounts, which of the following components must be considered?

A) Ensuring accounts are not susceptible to attack

B) Education of users

C) Physical security of the system or network

D) All of the above

6) The goal in terms of __________ is to make systems, services, and data available to the correct entities while denying access to these resources by unauthorized entities.

A) vulnerability

B) security

C) assessment

D) forensics

7) When used to define security principles, the term “entity” refers to which of the following?

A) People

B) Systems

C) Both people and systems

D) None of the above

8) Which of the following is not true regarding security principles?

A) You have to keep an eye on authorized users who may attempt to gain unauthorized access.

B) You have to find the right balance between making a system secure and making it available.

C) There is always a way to compromise a system if someone has enough time, resources, and knowledge.

D) External hackers try to compromise security by making a system deny access to unauthorized entities.

9) When you protect systems from theft and hardware errors, you are implementing which of the following?

A) Physical security

B) Account security

C) User education

D) None of the above

10) When you encourage users to report any suspicious activity immediately, you are implementing which of the following?

A) Physical security

B) Account security

C) User education

D) None of the above

11) When system logs are used to determine if someone is trying to gain unauthorized access to a system, this is an example of which of the following?

A) Physical security

B) Account security

C) User education

D) None of the above

12) Which of the following actions can be performed to prevent a user from changing an account password?

A) Make the max field of the /etc/shadow file a higher value than the min field.

B) Create a crontab entry to execute a command that prevents password changes.

C) Make the min field of the /etc/shadow file a higher value than the max field.

D) All of the above

13) Which of the following is a software tool that can be used to keep track of all commands executed by users?

A) psacct

B) accton

C) lastcomm

D) cron

14) Which of the following commands enables you to see a summary of all login times for each user in the last 24 hours?

A) mkdir /var/log/account

B) tar -xvf acct*

C) ac -p --individual-totals

D) touch /var/log/account/pact

15) How can a system administrator help avoid accidentally running commands that could destroy all system files?

A) Run the rm -r /* command when logged in as a regular user.

B) Run the rm -r /* command when logged in as a system administrator.

C) Log in as a regular user and use the sudo or su command to gain temporary root access.

D) It is not possible for a system administrator to run commands that destroy all system files.

16) Which of the following is a technique for gathering system information from users by using nontechnical methods?

A) Reverse engineering

B) Web application analysis

C) Sniffing and spoofing

D) Social engineering

17) Which of the following is a GUI-based utility that can be used to perform password-cracking operations?

A) hydra

B) Johnny

C) ncrack

D) john

18) When using the john or Johnny utility, you need to have a file that contains which of the following entries?

A) /etc/passwd

B) /etc/shadow

C) Both /etc/passwd and /etc/shadow

D) Neither /etc/passwd or /etc/shadow

19) Which of the following tools actively probes a system via a specific protocol, such as FTP?

A) john

B) hydra

C) Johnny

D) All of the above

20) Which button do you click in the Johnny utility to see what john command was executed?

A) Console log

B) Passwords

C) Statistics

D) Settings

Document Information

Document Type:
DOCX
Chapter Number:
8
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 8 Develop An Account Security Policy
Author:
William Rothwell

Connected Book

Answer Key + Test Bank | Linux Essentials 1e Rothwell

By William Rothwell

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party