Book: LPI Linux Certification in a Nutshell
Section: Chapter 22.  Exam 102 Review Questions and Exercises



22.9 Security (Topic 1.14)

22.9.1 Review Questions

  1. What daemon is associated with the control files /etc/hosts.allow and /etc/hosts.deny.

  2. In general terms, describe a method to locate SUID programs in the local filesystem. Why might an administrator do this routinely?

  3. What is the function of the md5sum utility?

  4. Why might a user run SSH instead of Telnet?

  5. Describe shadow passwords and the file where the passwords are stored.

22.9.2 Exercises

  1. Use find as described in Chapter 21, to locate SUID files. Is the list larger than you expected? Are the entries on your list justifiably SUID programs?

  2. Use the md5sum utility on a binary program file and examine its output.

  3. Using the instructions in Chapter 21 (or a package from your distribution), install SSH. Start sshd and attempt to connect to your own system with ssh localhost. The connection should proceed in a manner similar to a Telnet session.