Appendix A. Answer Key

CHAPTER 1 Security Threats to Linux

  1. B

  2. C

  3. D

  4. B

  5. A

  6. B

  7. C

  8. D

  9. A

  10. A and B

  11. C

  12. D

  13. Hacker

  14. General Public License (also acceptable: GPL, GNU GPL, GNU General Public License)

CHAPTER 2 Basic Components of Linux Security

  1. D

  2. http://kernel.org

  3. C

  4. B

  5. A

  6. C

  7. B

  8. D

  9. B

  10. A

  11. B

  12. D

  13. A

  14. C

CHAPTER 3 Basic Security: Facilities Through the Boot Process

  1. D

  2. C

  3. D

  4. A and C

  5. B

  6. A

  7. grub-md5-crypt

  8. B

  9. A

  10. B

  11. C

  12. B

  13. B and D

  14. C

CHAPTER 4 User Privileges and Permissions

  1. B

  2. B

  3. D

  4. find / -group audio

  5. C

  6. C and D

  7. B

  8. visudo

  9. B

  10. A

  11. D

  12. /lib/security/

  13. B

  14. A and B

  15. C

CHAPTER 5 Filesystems, Volumes, and Encryption

  1. B and D

  2. C

  3. A

  4. A

  5. gpg --list-keys

  6. C

  7. D

  8. A

  9. C

  10. A

  11. B

  12. B

  13. B

  14. A

  15. getfacl test1

CHAPTER 6 Every Service Is a Potential Risk

  1. A

  2. D

  3. B

  4. C

  5. B

  6. D

  7. chkconfig --list

  8. B

  9. D

  10. /etc/xinetd.conf

  11. B

  12. D

  13. C

  14. B

  15. D

CHAPTER 7 Networks, Firewalls, and More

  1. 0 to 1023

  2. A

  3. C

  4. B

  5. B

  6. D

  7. --dport

  8. B

  9. B

  10. C

  11. D

  12. B

  13. sealert -b

  14. B

CHAPTER 8 Networked Filesystems and Remote Access

  1. C

  2. D

  3. GSSAPI ...

Get Security Strategies in Linux Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.