What does this mean in the context of Linux Security?
John is discussing security with Jane. Jane had mentioned to John earlier that she suspects an
LKM has been installed on her server. She believes this is the reason that the server has been
acting erratically lately. LKM stands for Loadable Kernel Module.
What does this mean in the context of Linux Security?
Which of the following snort rules look for FTP root login attempts?
Which of the following snort rules look for FTP root login attempts?
how many user IDs can you identify that the attacker has tampered with?
After studying the following log entries, how many user IDs can you identify that the attacker has
tampered with?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc
What is the correct action to be taken by Rebecca in this situation as a recommendation to management?
Rebecca is a security analyst and knows of a local root exploit that has the ability to enable local
users to use available exploits to gain root privileges. This vulnerability exploits a condition in the
Linux kernel within the execve() system call. There is no known workaround that exists for this
vulnerability. What is the correct action to be taken by Rebecca in this situation as a
recommendation to management?
What is Cygwin?
What is Cygwin?
What would you call such a host?
Ron has configured his network to provide strong perimeter security. As part of his network
architecture, he has included a host that is fully exposed to attack. The system is on the public
side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call
such a host?
what is the attacker ultimately trying to achieve as inferred from the log sequence?
After studying the following log entries, what is the attacker ultimately trying to achieve as inferred
from the log sequence?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc
What are you most likely to infer from this?
Clive is conducting a pen-test and has just port scanned a system on the network. He has
identified the operating system as Linux and been able to elicit responses from ports 23, 25 and
53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as
running DNS service. The client confirms these findings and attests to the current availability of the
services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On typing
other commands, he sees only blank spaces or underscores symbols on the screen. What are you
most likely to infer from this?
How is it possible to list processes and uids associated with them in a more reliable manner?
On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?
What do you recommend?
Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for
help on a firewall. He wants to use Linux as his firewall and use the latest freely available version
that is offered. What do you recommend?
Select the best answer.