Security (Topic 1.114)

Review Questions

  1. What daemon is associated with the control files /etc/hosts.allow and /etc/hosts.deny.

  2. In general terms, describe a method to locate setuid programs in the local filesystem. Why might an administrator do this routinely?

  3. What is the function of the md5sum utility?

  4. Why might a user run ssh instead of telnet?

  5. Describe shadow passwords and the file where the passwords are stored.

Exercises

  1. Use find as described in Chapter 21 to locate setuid files. Is the list larger than you expected? Are the entries on your list justifiably setuid programs?

  2. Use the md5sum utility on a binary program file and examine its output.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset