Sair 3X Linux Security, Privacy and Ethics (Level 1)

Similar documents
Exam Name: level 1 security.ethics and privacy

2. INTRUDER DETECTION SYSTEMS

CompTIA SY CompTIA Security+

19.1. Security must consider external environment of the system, and protect it from:

DumpsTorrent. Latest dumps torrent provider, real dumps

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Snort Rules Classification and Interpretation

C I A C. Securing Internet Information Servers CIAC-2308 R.2. by the Members of the CIAC Team. December, UCRL-MA Department of Energy

Protection and Security

Implementing Internet Security

Introduction to UNIX/LINUX Security. Hu Weiwei

Language-Based Protection

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Part 1. Lecturer: Prof. Mohamed Bettaz Coordinator: Prof. Mohamed Bettaz Internal Examiner: Dr. Mourad Maouche. Examination Paper

Course Outline: Linux Professional Institute-LPI 202. Learning Method: Instructor-led Classroom Learning. Duration: 5.00 Day(s)/ 40 hrs.

Hackveda Training - Ethical Hacking, Networking & Security

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

PHP-security Software lifecycle General Security Webserver security PHP security. Security Summary. Server-Side Web Languages

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Strategic Infrastructure Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

What action do you want to perform by issuing the above command?

4 Information Security

0Activity Answers. Table A1-1: Operating system elements and security mechanisms. The Security Accounts Manager (SAM)

Unit 2 Assignment 2. Software Utilities?

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

CompTIA Security+ (2008 Edition) Exam

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts

HP HP-UX Networking and Security. Download Full Version :

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

GCIH. GIAC Certified Incident Handler.

IoT Vulnerabilities. By Troy Mattessich, Raymond Fradella, and Arsh Tavi. Contribution Distribution

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Guest Wireless Policy

II.C.4. Policy: Southeastern Technical College Computer Use

Securing CS-MARS C H A P T E R

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

EE 122: Network Security

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

e-commerce Study Guide Test 2. Security Chapter 10

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Discovering Computers Living in a Digital World

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

Chapter 4. Network Security. Part I

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:


CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

3X Linux System Administration (Level 1) Exam.

Protection and Security. Sarah Diesburg Operating Systems CS 3430

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger

Chapter 10: Security and Ethical Challenges of E-Business

Network Working Group. Category: Informational July 1997

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Securing Linux Systems Before Deployment

Acceptable Use Policy

Sair 3X Samba Resource Sharing.

Lotus Notes Domino 6/ 6.5 Developing Web Applications.

Lotus. IBM Lotus Notes Domino 7 Application Development Intermediate Skills

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

TELE 301 Lecture 8: Post

Linux Local Security about Passwords and Data NZPAPER.BLOGSPOT.COM. Nz Paper Linux and Web Application Security. Zeeshan Khan 4/15/2013

Configuring the CSS as a Client of a TACACS+ Server

Malware, , Database Security

Denial of Service Attacks

The Security Problem

ELEC 377 Operating Systems. Week 12 Class 2

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Firewalls 1. Firewalls. Alexander Khodenko

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz II

Acceptable Use Policy

Advanced Systems Security: Ordinary Operating Systems

Security Standards for Information Systems

Managing GSS User Accounts Through a TACACS+ Server

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

Joomla 3.X Global Settings Part III Server Settings

Protection and Security

CompTIA Security+(2008 Edition) Exam

SE420 Software Quality Assurance

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Program Structure. Steven M. Bellovin April 3,

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

CHAPTER 7 ADVANCED ADMINISTRATION PC

Security. Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018

SANS Exam SEC504 Hacker Tools, Techniques, Exploits and Incident Handling Version: 7.1 [ Total Questions: 328 ]

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

Firewalls, Tunnels, and Network Intrusion Detection

Smeal College of Business - Central Firewall Rules and Policies

Program Structure I. Steven M. Bellovin November 8,

HikCentral V.1.1.x for Windows Hardening Guide

Locking down a Hitachi ID Suite server

Program Structure I. Steven M. Bellovin November 14,

Transcription:

Sair 3X0-104 Linux Security, Privacy and Ethics (Level 1) http://killexams.com/exam-detail/3x0-104

QUESTION: 113 Mary, a senior system administrator, is reviewing the work of a junior system administrator assigned to setup an anonymous FTP Server. Mary notices the line below in the /etc/passwd file. Which of the following represents the security risk imposed by this line? ftp:*:700:700:anonymous FTP:/home/ftp:/bin/bash A. The anonymous FTP user is not presented with a password prompt. B. The FTP Server is now vulnerable to a buffer overflow attack. C. The space in the fifth field will cause an error and drop the user to a root shell. D. An anonymous FTP user is given a shell from which he can execute uploaded programs. Answer: D QUESTION: 114 Which of the following is a characteristic of an effective security policy? A. It states who is responsible for creating/updating new policy guidelines. B. It states exactly what is being protected and why. C. It states that the items at risk must be insured. D. It states those behaviors that are seen as appropriate by the company. Answer: B QUESTION: 115 The system administrator has discovered that his Server has been compromised. At a minimum, the intruder has obtained a username, password, and the root password. Which of the following will guarantee that the intruder has been removed from the system? A. Reformat all partitions and reinstall the system. B. Kill all existing processes and reboot. C. Change the root password and place a lock on the account to which the intruder has obtained access. 44

D. Force all users to change their passwords. Answer: A QUESTION: 116 A large server has many services running, including FTP, NFS, and NIS. It is hard for the administrator to find security holes in the services' configuration files, and this leads to possible security risks. Which of the following tools could the administrator use to check these services for security holes? A. NTOP B. LogCheck C. SAINT D. Tripwire QUESTION: 117 Tom is a system administrator for Linux ServerA. Tom is running a Perl script that will initiate a connection request from ServerA to ServerB without completing the network connection. This is done multiple times until ServerB can no longer communicate on the network. What kind of attack has Tom initiated? A. Spam blast B. TCP bomb C. Denial of Service D. Internet Worm QUESTION: 118 Katheryn wants to maximize security on her system by replacing ftpd with a program that logs requests, denies unauthorized users, and runs the original ftpd daemon. What should Kathryn use? 45

A. TCP wrappers B. A VPN C. Tripwire D. Packet filters Answer: A QUESTION: 119 An administrator finds a program on a network server that modifies several system service records when a certain user logs in and out. The program masks the intruder's actions. This is most likely an example of what type of a. A. Trojan horse B. Worm C. Back door D. Logic bomb Answer: D QUESTION: 120 Before Linuxsite sets up its Network, it develops its Network Policy. Which of the following is NOT a reason why Linuxsite should have a Network Policy set up? A. It will inform the users of the appropriate use of the system. B. It will providelinuxsite with liability protection if illegal activities are performed on their site without their knowledge. C. It will block unauthorized users from accessing the network. D. It will providelinuxsite with a standard way to deal with problems concerning the Network. QUESTION: 121 46

An administrator would like to make the Sysmon statusfile available on the Web so she can check Sysmon's status from anywhere. Which of the following Sysmon configuration file entries will put the statusfile in HTML form? A. config statusfile html B. config html /home/httpd/html/sysmon.html C. config statusfile sysmon.html D. config statusfile html /home/httpd/html/sysmon.html Answer: D QUESTION: 122 Patrick, the system administrator, is concerned about the security of Sendmail and decides to install smap. Which of the following best describes smap? A. The Sendmail daemon passes the request to smap, which parses the data against a table of malicious programs and IP addresses known for originating such programs. B. smap changes the permissions on all incoming data, which ensures that no attached program has root privileges. C. smap does not run as root or have access to anything outside the mail queue, so an attacker will not be able to gain access outside the mail queue. D. smap encrypts the data passing between machines by using a specified encryption algorithm and passing public and private encryption keys to verify the host. 47

For More exams visit https://killexams.com/vendors-exam-list Kill your exam at First Attempt...Guaranteed!