Test Bank Chapter 17 Develop An Automation Security Policy - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.
Linux Essentials for Cybersecurity (Rothwell/Kinsey)
Chapter 17 Develop an Automation Security Policy
1) Which of the following is recommended for securing the crontab and at commands?
A) Create written rules for the use of crontab and at that all users must follow, with consequences for misuse.
B) On workstations, provide access to users who routinely use the workstations and deny all others.
C) On system-critical servers, consider removing access to the crontab and at commands for all users.
D) All of the above
2) Which of the following permissions does the text recommend for securing the /etc/crontab file?
A) -rwx------
B) -rw------
C) drwx-----
D) drwxr-xr-x
3) Which of the following permissions does the text recommend for securing the /etc/cron.hourly file?
A) drwx-----
B) -rw-r--r--
C) -rw------
D) -rwx------
4) Which of the following permissions does the text recommend for securing the /etc/at.allow file?
A) drwx-----
B) -rwx------
C) -rwsr-xr-x
D) -rw------
5) Which of the following permissions does the text recommend for securing the /usr/bin/at file?
A) -rw------
B) drwx-----
C) -rwx------
D) -rw-r--r--
6) Which of the following is not true regarding security concerns for crontab and at?
A) If you remove a user’s ability to use the crontab and at commands, then any of that user’s existing crontab and at jobs would still execute.
B) Every system has the same crontab and at systems.
C) Disabling access only limits the user’s ability to create more crontab and at jobs.
D) Your security policy should have a procedure in place to identify and remove existing jobs when a user is blocked access.
7) Having a security policy for BASH scripts is important, because __________ will make use of existing scripts to compromise the system.
A) hackers
B) end users
C) system administrators
D) managers
8) Which of the following is not true when securing access to BASH scripts?
A) Make sure only the authorized users have access to the scripts and the ability to execute them.
B) Never place SUID or SGID permission on a BASH script.
C) A good permission set for a script is -rwxrwx--- whereas a bad permission set is -rwxr-x---.
D) Placing BASH scripts on a publicly accessible system poses a greater threat than on an internal server.
9) Which of the following is not true regarding security issues for script contents?
A) A script security policy should require all scripts to be free of any sensitive data.
B) In order to execute a script, the read permission has to be enabled for a user.
C) Unlike with most system binary commands, a user can see everything in a BASH script.
D) It is safer to use a variable rather than an absolute path when executing script commands.
10) Which of the following shell settings causes your shell script to exit prematurely if an unset variable is used?
A) set -e
B) set -u
C) set -x
D) set -f
11) Which of the following shell settings causes a script to exit automatically if any command in the script fails?
A) set -f
B) set -x
C) set -u
D) set -e
12) Which of the following shell settings causes the expansion of wildcards to be avoided?
A) set -u
B) set -e
C) set -f
D) set -x
13) The permissions for the /var/spool/at directory should be __________.
A) -rwsr-xr-x
B) drwx------
C) -rw-r--r--
D) drwxr-xr-x
14) Which of the following permissions does the text recommend for securing the /etc/cron.d file?
A) drwx-----
B) -rw-r--r--
C) drwxr-xr-x
D) -rwsr-xr-x
15) Which of the following permissions does the text recommend for securing the /etc/cron.allow file?
A) drwx-----
B) -rw------
C) -rwsr-xr-x
D) -rwx------
16) Which of the following permissions does the text recommend for securing the /usr/bin/crontab file?
A) -rw------
B) -rwsr-xr-x
C) -rwx------
D) drwx-----
17) Which of the following permissions does the text recommend for securing the /etc/anacrontab file?
A) -rwx------
B) drwx-----
C) -rwsr-xr-x
D) -rw------
18) Which of the following permissions does the text recommend for securing the /etc/cron.monthly file?
A) drwx-----
B) -rwsr-xr-x
C) -rwx------
D) -rw------
19) Which of the following permissions does the text recommend for securing the /etc/cron.deny file?
A) drwx-----
B) -rw-r--r--
C) -rw------
D) -rwx------
20) Which of the following permissions does the text recommend for securing the /etc/cron.daily file?
A) -rw------
B) drwx-----
C) -rwx------
D) drwxr-xr-x
Document Information
Connected Book
Answer Key + Test Bank | Linux Essentials 1e Rothwell
By William Rothwell