978-0840020932 Chapter 17

subject Type Homework Help
subject Pages 4
subject Words 941
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 17: UNIX/Linux Vulnerabilities
TRUE/FALSE
1. In 1973, the developers of UNIX revised it by writing it in assembly language.
2. Linux source code is available free of cost, and some Linux distributions (distros) are also free.
3. A true command line interface (Terminal mode using tty1 through tty6) never goes into screen-saver
mode.
4. UNIX and Linux systems use Trivial File Transfer Protocol, or TFTP, to start diskless computers.
5. You cannot use the mutt package in conjunction with PGP.
MULTIPLE CHOICE
1. Linux was derived from UNIX by an engineering student from Finland named ____ in 1991.
a.
Ken Thompson
c.
Linus Torvalds
b.
Steve Jobs
d.
Dennis Ritchie
2. The first version of UNIX was written in ____ language.
a.
C
c.
Lisp
b.
Fortran
d.
assembly
3. To delete an account in Linux, use the following syntax:
a.
eraseuser account_name
c.
del account_name
b.
userdel account_name
d.
accountdel account_name
4. The ____ utility can be used for finding strings within files.
a.
grep
c.
find
b.
locate
d.
subexpr
5. The r utilities use an insecure mechanism called ____.
a.
rsh
c.
rallow
page-pf2
b.
rlogin
d.
rhosts
COMPLETION
1. ____________________ is the default and unchanging administrative user for UNIX/Linux systems.
2. The ____________________ command helps users of a Linux operating system temporarily switch the
current privileges available to those of the root account.
3. Linux and UNIX-based operating systems use the sendmail daemon to send e-mail messages by
employing ___________________________________.
4. The ____________________ package allows system administrators to grant some or all root privileges
to users listed in the sudoers text file.
5. The wu-ftpd server allocates memory by using a function called ____________________.
SHORT ANSWER
1. What are the basic exploits of a Linux system?
page-pf3
2. What can go wrong if every user of a Linux system has unlimited access to resources?
3. What are some of the Telnet service vulnerabilities?
4. Describe the mutt buffer overflow vulnerability.
5. Briefly explain the GID Man exploit.
page-pf4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.