Search Header Logo

Linux Understanding Basic Security in Linux

Authored by Patrick Hines

Computers

Professional Development

Used 6+ times

Linux Understanding Basic Security in Linux
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're managing a web server and suspect unauthorized access attempts. Which logs would be most helpful in identifying these attempts?

Kernel logs
Web server access logs
Package manager logs
Desktop environment logs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're creating a new user account on your Linux system. Which permission should the user account NOT have by default?

Read
Write
Execute
All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You accidentally deleted an important system file. What's the best course of action if you have a recent system backup available?

Reinstall the entire operating system
Use a data recovery tool
Manually recreate the file
Restore the system from the backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're concerned about the physical security of your server. Which security measure is MOST crucial in this regard?

Update software regularly
Use strong passwords
Enable firewalls
Encrypt the server's hard drive

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports they can't access a specific application. You suspect insufficient permissions might be the issue. Which command can help you verify file permissions?

locate
ls -l
ps
top

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're configuring a firewall and want to block all incoming traffic except for SSH connections on port 22. Which firewall rule would achieve this?

Allow all traffic except SSH
Deny all traffic except SSH
Block port 22
Permit SSH connections only

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While browsing the web, you encounter a message claiming a critical security update is available for your Linux system. How can you safely verify if a legitimate update exists?

Click the link in the message
Search the web using the message text
Check your distribution's official channels
Contact technical support

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?