Develop An Account Security Policy Verified Test Bank Ch.8 - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.
Linux Essentials for Cybersecurity (Rothwell/Kinsey)
Chapter 8 Develop an Account Security Policy
1) After you install Kali Linux, you can access the security tools by clicking __________ at the top of the window.
A) Applications
B) Places
C) Files
D) Tools
2) Which of the following is not one of the categories of Kali Linux tools?
A) Password Attacks
B) Vulnerability Analysis
C) Pre Exploitation
D) Reverse Engineering
3) A good security policy should include all but which of the following?
A) A set of rules that determines what is and is not allowed on systems
B) A means to ensure that all rules are being followed
C) A well-defined plan to handle when a system is compromised
D) A way to ensure that policies remain stable as new information becomes available
4) When a system is compromised, which of the following should include who is notified, what actions should be taken, and so on?
A) Reporting tools
B) Incident response plan
C) Web application analysis
D) Social engineering tools
5) When securing user accounts, which of the following components must be considered?
A) Ensuring accounts are not susceptible to attack
B) Education of users
C) Physical security of the system or network
D) All of the above
6) The goal in terms of __________ is to make systems, services, and data available to the correct entities while denying access to these resources by unauthorized entities.
A) vulnerability
B) security
C) assessment
D) forensics
7) When used to define security principles, the term “entity” refers to which of the following?
A) People
B) Systems
C) Both people and systems
D) None of the above
8) Which of the following is not true regarding security principles?
A) You have to keep an eye on authorized users who may attempt to gain unauthorized access.
B) You have to find the right balance between making a system secure and making it available.
C) There is always a way to compromise a system if someone has enough time, resources, and knowledge.
D) External hackers try to compromise security by making a system deny access to unauthorized entities.
9) When you protect systems from theft and hardware errors, you are implementing which of the following?
A) Physical security
B) Account security
C) User education
D) None of the above
10) When you encourage users to report any suspicious activity immediately, you are implementing which of the following?
A) Physical security
B) Account security
C) User education
D) None of the above
11) When system logs are used to determine if someone is trying to gain unauthorized access to a system, this is an example of which of the following?
A) Physical security
B) Account security
C) User education
D) None of the above
12) Which of the following actions can be performed to prevent a user from changing an account password?
A) Make the max field of the /etc/shadow file a higher value than the min field.
B) Create a crontab entry to execute a command that prevents password changes.
C) Make the min field of the /etc/shadow file a higher value than the max field.
D) All of the above
13) Which of the following is a software tool that can be used to keep track of all commands executed by users?
A) psacct
B) accton
C) lastcomm
D) cron
14) Which of the following commands enables you to see a summary of all login times for each user in the last 24 hours?
A) mkdir /var/log/account
B) tar -xvf acct*
C) ac -p --individual-totals
D) touch /var/log/account/pact
15) How can a system administrator help avoid accidentally running commands that could destroy all system files?
A) Run the rm -r /* command when logged in as a regular user.
B) Run the rm -r /* command when logged in as a system administrator.
C) Log in as a regular user and use the sudo or su command to gain temporary root access.
D) It is not possible for a system administrator to run commands that destroy all system files.
16) Which of the following is a technique for gathering system information from users by using nontechnical methods?
A) Reverse engineering
B) Web application analysis
C) Sniffing and spoofing
D) Social engineering
17) Which of the following is a GUI-based utility that can be used to perform password-cracking operations?
A) hydra
B) Johnny
C) ncrack
D) john
18) When using the john or Johnny utility, you need to have a file that contains which of the following entries?
A) /etc/passwd
B) /etc/shadow
C) Both /etc/passwd and /etc/shadow
D) Neither /etc/passwd or /etc/shadow
19) Which of the following tools actively probes a system via a specific protocol, such as FTP?
A) john
B) hydra
C) Johnny
D) All of the above
20) Which button do you click in the Johnny utility to see what john command was executed?
A) Console log
B) Passwords
C) Statistics
D) Settings
Document Information
Connected Book
Answer Key + Test Bank | Linux Essentials 1e Rothwell
By William Rothwell