Question

In: Computer Science

1. Which Linux permissions would assign the owner full access, the group RX access, and everyone...

1. Which Linux permissions would assign the owner full access, the group RX access, and everyone else read access.


2. An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel iframe that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of a ___________ attack.

  1. Man-in-the-middle
  2. Remote Code Execution
  3. Waterholing
  4. Replay

3. During a log review, you discover a series of logs that shows the following multiple failed login attempts:

Jan 31 11:39:20 ip-10.0.0.2 sshd[10102]: Invalid user admin from remotehost passwd=bears
Jan 31 11:39:20 ip-10.0.0.2 sshd[10108]: Invalid user admin from remotehost passwd=eat
Jan 31 11:39:20 ip-10.0.0.2 sshd[10114]: Invalid user admin from remotehost passwd=beats
Jan 31 11:39:20 ip-10.0.0.2 sshd[10118]: Invalid user admin from remotehost passwd=battlestar
Jan 31 11:39:20 ip-10.0.0.2 sshd[10120]: Invalid user admin from remotehost passwd=galactica

What type(s) of attack have you discovered?

  1. A brute force attack
  2. A rainbow table attack
  3. A man-in-the-middle attack

d. A dictionary attack

4. In a virtualized environment, the ___________ is responsible for managing resources and requests from the guest operating systems.

Solutions

Expert Solution

1
Ans: chmod 754 filename
Explanation: chmod is the command to change permissions. 754 are the permissions
the first digit 7 is permission for the owner
the second digit 5 is permission for the group
the third digit 4 is permission for he others
permission digit is the sum of three permissions.
4 for reading permission
2 for the write permission
1 for execution permission

0 for no permission
e.g if you want to give read and write permission only then 4 + 2 = 6.

2.
Ans: water holing
Explanation: In water, holing guesses the websites which the victim usually uses. And then the attacker infects that website with malware

3.
Ans: Brute force attack
Explanation: In the brute force attack, the attacker uses many combinations of words/digits to guess the password

4.
ans: Hypervisors
Explanation: Hypervisors manage the resources and the requests from the guest OS


Related Solutions

1. When a file is created on Linux Operating System, What are the default permissions of...
1. When a file is created on Linux Operating System, What are the default permissions of the file? 2. Write a command to find the total disk space used by a specific user on linux system? 3. What is "s" permission bit in a file? 4. Explain the difference between grep and egrep? 5. Write a command to list files where third letter is x or y? 6. Write command to remove array element with id 5? 7. Write a...
linux Using the grep or egrep commands, what would be the full command (including regular expression)...
linux Using the grep or egrep commands, what would be the full command (including regular expression) to view only the lines in the file /boot/grub/grub.cfg that DO NOT begin with a hashtag (the # sign). In other words, what would be the command to print all the lines in this file that do not begin with this character.
Increasingly, patients expect full access to their EMRs and EHRs, What limitations, if any, would be...
Increasingly, patients expect full access to their EMRs and EHRs, What limitations, if any, would be in the best interest of patients? For example, should healthcare providers have access to new test results for 3 full business days before these are posted for patient viewing?
Which type of corporation (C or S) would you prefer as the business owner? Which would...
Which type of corporation (C or S) would you prefer as the business owner? Which would you prefer as the taxpayer? Recall how the income for each is treated to inform your response.
1. Discuss whether they would prefer to use a Linux or Windows boot loader on their...
1. Discuss whether they would prefer to use a Linux or Windows boot loader on their home OS and explain their reasons why. 2. Discuss some of the different reasons why they believe a Linux system should or should not be configured to use the X Windows environment. Why do they think that some administrators might choose to use the environment while others would not?
1. Discuss John Locke’s idea that, in a state of nature, everyone would be political equals...
1. Discuss John Locke’s idea that, in a state of nature, everyone would be political equals and free of constraints, and how those rights affect American institutions. 2. According to Adam Smith, how does free market competition provide greater benefits than government interference? 3. Discuss Karl Marx’s view on how capitalist economies alienate workers.
An owner of a candy shop would like to know which of their products her customers...
An owner of a candy shop would like to know which of their products her customers prefer over others. The owner conducts a customer preference survey based on a sample of 1150 customers. The results are given in the table below. Conduct the appropriate hypothesis test using an alpha level of .01. Chocolate Covered Cherries Gummy Ropes Jawbreakers Sugar-Free Gum 320 265 285 280 4A. Set up the criteria for making the decision. That is, find the critical value. (1...
Statement 1: A society in which everyone is self-sufficient will generally have a higher standard of...
Statement 1: A society in which everyone is self-sufficient will generally have a higher standard of living than one in which everyone specializes in a particular type of work. Statement 2: People can specialize only if there is a well-developed system of exchange. Statement 1 is true and Statement 2 is false. Statement 2 is true and Statement 1 is false. Both statements are true. Both statements are false.
1. What are the three categories into which the Bureau of Labor Statistics divides everyone? How...
1. What are the three categories into which the Bureau of Labor Statistics divides everyone? How does the BLS compute the labor force, the unemployment rate, and the labor-force participation rate? 2. Why is frictional unemployment inevitable? How might the government reduce the amount of frictional unemployment? 3. Are minimum-wage laws a better explanation for structural unemployment among teenagers or among college graduates? Why? 4. How do unions affect the natural rate of unemployment? 5. What claims do advocates of...
1. Imagine a world where everyone payments are digital, what purposes would we have for cash?...
1. Imagine a world where everyone payments are digital, what purposes would we have for cash? (a) Give as many reasons as you can why people would still hold cash (b) What percentage of their income would you guess people would hold as cash, on average? (c) What effect would this have on the money multiplier?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT