Book: LPI Linux
Certification in a Nutshell Section: Chapter 22.
Exam 102 Review Questions and Exercises
22.9 Security (Topic 1.14)
22.9.1 Review Questions
-
What daemon is associated with the control
files /etc/hosts.allow and /etc/hosts.deny.
-
In general terms, describe a method to
locate SUID programs in the local filesystem. Why might an
administrator do this routinely?
-
What is the function of the md5sum utility?
-
Why might a user run SSH instead of
Telnet?
-
Describe shadow passwords and the file
where the passwords are stored.
22.9.2 Exercises
-
Use find as
described in Chapter
21, to locate SUID files. Is the list larger than you
expected? Are the entries on your list justifiably SUID
programs?
-
Use the md5sum utility on a binary program
file and examine its output.
-
Using the instructions in Chapter
21 (or a package from your distribution), install SSH.
Start sshd and attempt to
connect to your own system with ssh
localhost. The connection should proceed in a manner
similar to a Telnet session.
|
| |