
Security Strategies in Linux Platforms and Applications Chapter Test Questions (Chapter 6-10)
Authored by John Doe
others

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
66 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. AppArmor and SELinux are used to implement which of the following? (Chapter 6)
A. Lattice-based access controls
B. Mandatory access controls
C. Password protection
D. File sharing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. A set of services that get started is determined by which of the following? (Chapter 6)
A. Runlevel
B. Init
C. Process control
D. Init.d
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
3. Service scripts in a system controlled by the init master process are kept in which directory? (Chapter 6)
A. /proc
B. /etc/proc
C. /init
D. /etc/init.d
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
4. A database server should typically be restricted to listening on which port? (Chapter 6)
A. eth0
B. All ports
C. Loopback
D. Looparound
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
5. SELinux was initially developed as a set of extensions by which of the following? Untitled Question (Chapter 6)
A. The NSA
B. The CIA
C. The Electronic Freedom Foundation
D. The GNU Foundation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
6. Systemctl is used to perform what system function? (Chapter 6)
A. Install packages
B. Manage services
C. Manage passwords
D. Configure the Web server
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
7. What might services implement to provide better protection from remote attacks? (Chapter 6)
A. Access control lists
B. Systemctl
C. Initd
D. Firewall-lib
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?