0
0
Cybersecurityknowledge~5 mins

Linux security fundamentals in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the primary purpose of the Linux file permissions system?
The Linux file permissions system controls who can read, write, or execute files and directories, helping to protect data from unauthorized access.
Click to reveal answer
beginner
What does the 'root' user represent in Linux?
The 'root' user is the superuser in Linux with full control over the system, able to perform any action without restrictions.
Click to reveal answer
beginner
Why is it important to keep Linux software updated?
Updating Linux software fixes security vulnerabilities and bugs, reducing the risk of attacks and keeping the system safe.
Click to reveal answer
beginner
What is the role of a firewall in Linux security?
A firewall controls incoming and outgoing network traffic based on security rules, helping to block unauthorized access to the Linux system.
Click to reveal answer
intermediate
What is SELinux and why is it used?
SELinux (Security-Enhanced Linux) adds an extra layer of security by enforcing strict access controls on processes and files beyond standard permissions.
Click to reveal answer
Which Linux user has unrestricted access to all commands and files?
Aroot
Bguest
Cadmin
Duser
What does the 'chmod' command do in Linux?
AChanges file ownership
BChanges file name
CChanges file permissions
DChanges file location
Why should you avoid running everyday tasks as the root user?
AIt can accidentally cause system damage
BIt slows down the system
CIt uses more memory
DIt disables security updates
Which tool is commonly used to manage firewall rules on Linux?
Agrep
Bcron
Cssh
Diptables
What is the main benefit of using SELinux?
AImproves system speed
BProvides enhanced access control
CSimplifies user management
DAutomatically updates software
Explain how Linux file permissions help secure a system.
Think about who can do what with files and folders.
You got /5 concepts.
    Describe the role of the root user and why it should be used carefully.
    Consider why having all power can be dangerous.
    You got /4 concepts.