In: Computer Science
1. Which Linux permissions would assign the owner full access, the group RX access, and everyone else read access.
2. An attacker compromises the Washington Post's web server and
proceeds to modify the homepage slightly by inserting a 1x1 pixel
iframe that directs all website visitors to a webpage of his
choosing that then installs malware on the visitors' computers. The
attacker did this explicitly because he knows that US policymakers
frequent the website. This would be an example of a ___________
attack.
3. During a log review, you discover a series of logs that shows
the following multiple failed login attempts:
Jan 31 11:39:20 ip-10.0.0.2
sshd[10102]: Invalid user admin from remotehost passwd=bears
Jan 31 11:39:20 ip-10.0.0.2 sshd[10108]: Invalid user admin from
remotehost passwd=eat
Jan 31 11:39:20 ip-10.0.0.2 sshd[10114]: Invalid user admin from
remotehost passwd=beats
Jan 31 11:39:20 ip-10.0.0.2 sshd[10118]: Invalid user admin from
remotehost passwd=battlestar
Jan 31 11:39:20 ip-10.0.0.2 sshd[10120]: Invalid user admin from
remotehost passwd=galactica
What type(s) of attack have you discovered?
d. A dictionary attack
4. In a virtualized environment, the ___________ is responsible for managing resources and requests from the guest operating systems.
1
Ans: chmod 754 filename
Explanation: chmod is the command to change permissions. 754 are
the permissions
the first digit 7 is permission for the owner
the second digit 5 is permission for the group
the third digit 4 is permission for he others
permission digit is the sum of three permissions.
4 for reading permission
2 for the write permission
1 for execution permission
0 for no permission
e.g if you want to give read and write permission only then 4 + 2 =
6.
2.
Ans: water holing
Explanation: In water, holing guesses the websites which the victim
usually uses. And then the attacker infects that website with
malware
3.
Ans: Brute force attack
Explanation: In the brute force attack, the attacker uses many
combinations of words/digits to guess the password
4.
ans: Hypervisors
Explanation: Hypervisors manage the resources and the requests from
the guest OS