
Linux Understanding Basic Security in Linux
Authored by Patrick Hines
Computers
Professional Development
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're managing a web server and suspect unauthorized access attempts. Which logs would be most helpful in identifying these attempts?
Kernel logs
Web server access logs
Package manager logs
Desktop environment logs
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're creating a new user account on your Linux system. Which permission should the user account NOT have by default?
Read
Write
Execute
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You accidentally deleted an important system file. What's the best course of action if you have a recent system backup available?
Reinstall the entire operating system
Use a data recovery tool
Manually recreate the file
Restore the system from the backup
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're concerned about the physical security of your server. Which security measure is MOST crucial in this regard?
Update software regularly
Use strong passwords
Enable firewalls
Encrypt the server's hard drive
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports they can't access a specific application. You suspect insufficient permissions might be the issue. Which command can help you verify file permissions?
locate
ls -l
ps
top
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're configuring a firewall and want to block all incoming traffic except for SSH connections on port 22. Which firewall rule would achieve this?
Allow all traffic except SSH
Deny all traffic except SSH
Block port 22
Permit SSH connections only
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While browsing the web, you encounter a message claiming a critical security update is available for your Linux system. How can you safely verify if a legitimate update exists?
Click the link in the message
Search the web using the message text
Check your distribution's official channels
Contact technical support
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?