Question

1. Which of the following commands will locate all of the program files on a computer...

1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set?

Select one:

a. find / -type SUID

b. find / -perm +4000 -type f

c. find / -perm +SUID -type f

d. find / -suid

2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs?

Select one:

a. TCP wrappers refuses to run and logs an error in /var/log/messages

b. The system administrator is paged to decide whether to allow access

c. hosts.deny takes precedence; the client is denied access to the server

d. hosts.allow takes precedence; the client is granted access to the server

3. What is the primary function of /etc/resolv.conf?

Select one:

a.It holds locally-defined mappings of IP addresses to hostnames.

b.It holds the IP addresses of up to three DNS servers that Linux may use.

c. It holds data on the utilities that Linux uses to authenticate users.

d. It holds usernames and associated basic account information.

4. Which service might you consider retiring after activating an SSH server?

Select one:

a. SMTP

b. Telnet

c. NTP

d. Samba

5. You run a VNC login server via xinetd, and you want to restrict access to this server such that only users on the 10.217.105.0/24 network can access it. What can you add to the VNC server’s xinetd configuration file to accomplish this goal?

Select one:

a. access 10.217.105.0/24

b. bind 10.217.105.0/24

c. hosts.allow 10.217.105.0/24

d. only_from 10.217.105.0/24

6. Which of the following statements are true of SSH? (Choose all that apply)

Select one or more:

a. Most default configurations allow root to log in directly.

b. Encryption makes SSH safer than Telnet.

c. The default port used is 53

d. By default, SSH uses UDP.

7. As part of a security audit, you plan to use Nmap to check all of the computers on your network for unnecessary servers. Which of the following tasks should you do prior to running your Nmap check?

Select one:

a. Back up /etc/passwd on the target systems to eliminate the possibility of it being damaged

b. obtain the root passwords to the target systems so that you can properly configure them to accept the Nmap probes

c. obtain written permission from your boss to perform the Nmap sweep.

d. Configure /etc/sudoers on the computer you intend to use for the sweep, to give yourself the ability to run Nmap.

8. Which of the following characterize good passwords? (Choose all that apply.)

Select one or more:

a. Those that are common English words

b. Those that contain digits or punctuation characters

c. Those that are shorter than four characters in length

d.Those that mix upper- and lowercase characters

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.B.

The -perm option to find locates files with the specified permissions, and +4000 is a permission code that matches SUID files. The -type f option restricts matches to files in order to avoid false alarms on directories.

2. D.

TCP Wrappers uses this feature to allow you to override broad denials by adding more specific explicit access permissions to hosts.allow

3. A.

Option A identifies function of /etc/resolv.conf

4. B.

SSH is directly replacement of Telnet.

5. C. hosts.allow 10.217.105.0/24

6. B.

Encryption makes SSH safer than Telnet.

7. C.

Although Nmap and other port scanners are useful security tools, they're used by crackers and many organisations have policies restricting their use.

8. B, D

Add a comment
Know the answer?
Add Answer to:
1. Which of the following commands will locate all of the program files on a computer...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1a) Which of the following statements is true? Running SSH on the Telnet port will now...

    1a) Which of the following statements is true? Running SSH on the Telnet port will now be sent across an unencrypted port. Despite the results of the scan, the service running on port 23 is actually Telnet and not SSH, and creates an additional vulnerability Running SSH on port 23 provides little additional security from running it on the standard port. Remote SSH connections will automatically default to the standard SSH port. The use of OpenSSH on its default secure...

  • computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE...

    computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE IMMENSELY APPRECIATED! THANKS. Task 1 In the following scenario, we would like to find out more information about a host that is on out network. Given an IP address we would like to search for additional information, we can start with obtaining the IP address off the default route. When running on a Linux VM, this like most likely to be the internal IP...

  • CST 2400 Assignment Question 1: In a client-server based network, the host is trying to connect...

    CST 2400 Assignment Question 1: In a client-server based network, the host is trying to connect to the remote host but is not making an active connection which means the connection has timed out. Specifically, the user uses the telnet command to send a packet to a specific address, but no hosts are responding. Assume that the user from the local TCP/IP host issued the following command: # telnet hostname telnet ....... connection timed out Please diagnose the network connection...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.)...

    Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...

  • QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a....

    QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a. Network b. Link c. Transport d. Application 2.5 points    QUESTION 9 A relational database is a collection of one or more tables that are related by key values. True False 2.5 points    QUESTION 10 Which standards organization produced the OSI reference model for internet communication? a. IEEE b. ISO c. ANSI 2.5 points    QUESTION 11 Which of the following is used...

  • C++ Program - Arrays- Include the following header files in your program:     string, iomanip, iostream Suggestion:...

    C++ Program - Arrays- Include the following header files in your program:     string, iomanip, iostream Suggestion: code steps 1 thru 4 then test then add requirement 5, then test, then add 6, then test etc. Add comments to display assignment //step 1., //step 2. etc. This program is to have no programer created functions. Just do everything in main and make sure you comment each step. Create a program which has: 1. The following arrays created:                 a. an array...

  • QUESTION 1 Given two double variables named x and y, which of the following statements could...

    QUESTION 1 Given two double variables named x and y, which of the following statements could you use to initialize both variables to a value of 0.0? a. x | y = 0.0; b. x = y = 0.0; c. x, y = 0.0; d. none of the above 1 points    QUESTION 2 When you use a range-based for loop with a vector, you a. can avoid out of bounds access b. must still use a counter variable c....

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • FINAL Homework 1- Multiple choice questions (1 point each) Please answer all the following questions. Which...

    FINAL Homework 1- Multiple choice questions (1 point each) Please answer all the following questions. Which one of the following is NOT considered as a natural resource? Energy from the sun Energy from the wind Energy from a battery a Energy from water 2. Aquifers are formed of water That infiltrates into the ground That evaporates into the air None of the above s. Which of the following are advantages of withdrawing groundwater? Sinkhole formation Overpumping Increased contamination from deeper...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT