Linux Security Basics and Tools Quiz Quiz

Explore essential Linux security fundamentals and ecosystem tools with this quiz focused on topics like permissions, authentication, auditing, and process management. Improve your understanding of core practices and tools vital for maintaining secure Linux environments.

  1. Understanding File Permissions

    What command would you use to change the permissions of a file named 'config.txt' so that only the owner has read and write access, while others have no access?

    1. chmod 600 config.txt
    2. chown 600 config.txt
    3. chperm 600 config.txt
    4. chmod rwx config.txt

    Explanation: The correct answer is 'chmod 600 config.txt', which sets the permissions so that only the owner can read and write, and no one else has access. 'chown' is used for changing file ownership, not permissions. 'chperm' is not a valid Linux command. 'chmod rwx config.txt' does not provide a numeric value and would result in a syntax error. Therefore, only 'chmod 600' achieves the intended security setting.

  2. Pluggable Authentication Modules (PAM)

    Which Linux security framework allows system administrators to configure how authentication, account, password, and session management are handled through modular components?

    1. PAM
    2. PAX
    3. PRM
    4. RAM

    Explanation: PAM (Pluggable Authentication Modules) lets administrators manage authentication and related functions with modular components. PAX relates to memory protection, not authentication. PRM is not a standard Linux security framework, and RAM refers to system memory, unrelated to security modules. Thus, PAM is the correct component for this purpose.

  3. System Auditing Tools

    If you need to monitor and record specific events such as file changes or user actions for security auditing on a Linux system, which tool would you use?

    1. auditd
    2. authd
    3. audity
    4. editd

    Explanation: auditd is the Linux Auditing system daemon that records events for security auditing, making it the correct choice. 'authd' is commonly confused with authentication daemons but is not an auditing tool. 'audity' is a misspelling and not a standard tool, while 'editd' does not exist. Only auditd performs the required monitoring and logging.

  4. Process Management and Security

    Which Linux command-line tool allows you to view running processes and their real-time resource usage, which can help in identifying malicious or suspicious activity?

    1. top
    2. tip
    3. tap
    4. topp

    Explanation: The 'top' command displays active processes and resource usage, which is useful for security monitoring. 'tip' is a terminal program, unrelated to process viewing. 'tap' does not refer to a process manager, and 'topp' is a typo. Thus, 'top' is the only correct tool in this context.

  5. Checking Open Network Ports

    Suppose you want to check active listening ports and associated services on your Linux system for potential vulnerabilities. Which command should you use?

    1. netstat -tuln
    2. nekstat -tuln
    3. netstart -tuln
    4. netscan -tuln

    Explanation: The 'netstat -tuln' command lists currently active listening ports and related information, aiding security assessment. 'nekstat' and 'netstart' are misspellings or non-existent commands, while 'netscan' is not a standard Linux utility for listing ports. Therefore, 'netstat -tuln' is the correct and effective option.