0
0
Cybersecurityknowledge~20 mins

Linux security fundamentals in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Linux Security Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Linux File Permissions

What is the output of the command ls -l for a file with permissions -rwxr-x--x?

Specifically, what does the permission string rwxr-x--x mean for the file owner, group, and others?

AOwner can execute only; group can read and execute; others can read and write.
BOwner can read and write; group can write and execute; others can read only.
COwner can read, write, and execute; group can write only; others have no permissions.
DOwner can read, write, and execute; group can read and execute; others can only execute.
Attempts:
2 left
💡 Hint

Remember the order of permissions is read (r), write (w), and execute (x) for owner, group, and others.

📋 Factual
intermediate
2:00remaining
Linux User Privileges and sudo

Which of the following statements about the sudo command in Linux is correct?

A<code>sudo</code> allows a user to run commands as another user, typically root, after authentication.
B<code>sudo</code> permanently grants root access to a user without password prompts.
C<code>sudo</code> is used to change file ownership between users.
D<code>sudo</code> disables all user permissions temporarily.
Attempts:
2 left
💡 Hint

Think about how sudo helps users perform tasks requiring higher privileges.

🔍 Analysis
advanced
2:00remaining
Analyzing Linux Firewall Rules

Given the following iptables rule, what is its effect?

iptables -A INPUT -p tcp --dport 22 -j ACCEPT
AAllows outgoing TCP connections on port 22.
BBlocks all incoming TCP connections on port 22.
CAllows incoming TCP connections on port 22 (SSH).
DLogs all incoming TCP connections on port 22 without allowing them.
Attempts:
2 left
💡 Hint

Consider the chain INPUT and the target ACCEPT.

Comparison
advanced
2:00remaining
Comparing Linux Authentication Methods

Which of the following best describes the difference between password-based and key-based SSH authentication?

APassword-based requires typing a password; key-based uses cryptographic keys for automatic authentication.
BPassword-based uses keys stored on the server; key-based requires manual password entry each time.
CPassword-based is more secure than key-based authentication.
DKey-based authentication disables encryption during SSH sessions.
Attempts:
2 left
💡 Hint

Think about how SSH keys work compared to passwords.

Reasoning
expert
2:00remaining
Evaluating Linux Security Best Practices

Which of the following actions would most effectively reduce the risk of unauthorized root access on a Linux server?

AAllow root login only with a strong password over SSH.
BDisable root login over SSH and use <code>sudo</code> for administrative tasks.
CUse the root account for all daily tasks to monitor activity closely.
DRemove all user accounts except root to simplify management.
Attempts:
2 left
💡 Hint

Consider the principle of least privilege and secure remote access.