Module 4: Linux and SQL Flashcards

(111 cards)

1
Q

Operating system (OS)

The i________ between computer h_______ and the u___

A

interface; hardware; user;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware

The p______ components of a c_______

A

physical; computer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Windows is a c____-s_____ operating system, which means the s_____ c___ is not shared freely with the p_____.
  • MacOS is partially o___-s______. It has some o___ s______ components, such as macOS’s k_____.
A

cloud-source; source code; public;
open-source; open source; kernel;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Linux

  • Completely o___-s______ operating system.
  • Particularly important for the s_______ industry.
A

open source; security;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Legacy operating systems

  • An operating system that is o_______ but still being u___.
  • Some organizations continue to use l_____ o________ s_______ because the s_______ they rely on is not compatible with newer operating systems.
  • Can be vulnerable to s_______ i______ because they are no longer s_________ or u________.
A

outdated; used;
legacy operating systems; software;
security issues; supported updated;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application

A p______ that performs a specific t___

A

program; task;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A__________ send requests to the o______ s_____, and the o_______ s______ directs those requests to the h_______

A

Applications; operating system; operating system; hardware;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Basic Input / Output System (BIOS)

A m_______ that contains l______ i_________ for the c________ and is prevalent in older systems

A

microchip; loading instructions; computer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unified Extensible Firmware Interface (UEFI)

A m______ that contains l______ i__________ for the c_________ and replaces _ _ _ _ on more modern systems

A

microchip; loading instructions; computer; BIOS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bootloader

  • A s_____ p_____ that b____ the operating system.
  • Once the operating system has finished b______, your computer is ready for use.
A

software program; boots;
booting;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Completing a task on a computer is a four-part process…?

A

User <–> Application <–> Operating System <–> Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is necessary for the OS to handle r_______ and m_____ m________ in order to ensure the l______ c_______ of the c________ system is used where it is needed most.

A

resource; memory management; limited capacity; computer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual machine (VM)

  • The v_____ v_____ of a physical computer.
  • V_________ is the process of using s______ to create v_____ representations of various p_____ machines.
A

virtual version;
Virtualization; software; virtual; physical;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Random Access Memory (RAM)

  • A hardware component used for s____-t___ m_____.
  • If a computer has _ _ GB of RAM, it can host _ virtual machines so that the physical computer and virtual machines each have _ GB of RAM.
A

short-term memory;
16; 3; 4;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Benefits of virtual machines

  • S______: virtualization can provide an i______ environment, or a s______, on the physical host machine.
  • E_______: Multiple v_____ m______ can be opened at once, and you can s_____ easily between them. This allows you to s________ s_______ tasks.
A

Security; isolated; sandbox;
Efficiency; virtual machines; switch; streamline security;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Virtual machines can be m______ with a software called a h_______.
  • H________ help users manage m______ v_____ m_______ and connect the v______ and p______ hardware.
A

managed; hypervisor; Hypervisors; multiple virtual machines; virtual; physical;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Kernel-based Virtual Machine (KVM)

  • An o___-s_____ h________ that is supported by most major L____ distributions.
  • It can be used to create v_____ m______ on any machine running a L____ operating system.
A

open-source hypervisor; Linux;
virtual machines; Linux;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In order to carry out tasks on a c_______, users directly interact with a__________

A

computer; applications;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • The _ _ _ _ or _ _ _ _ m_______ is activated when a user turns on a c________.
  • The _ _ _ _ or _ _ _ _ m_______ loads the b________, and the b________ starts the operating system.
A

BIOS; UEFI microchip; computer;
BIOS; UEFI microchip; bootloader; bootloader;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

User interface

A program that allows the u___ to c_____ the f_______ of the operating system

A

user; control; functions;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Graphical User Interface (GUI)

A u___ i_______ that uses i____ on the screen to manage different t___ on the c_______

A

user interface; icons; tasks; computer;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Basic GUI components
- S____ m___
- T___ b__
- D_____ with i____ and s_______

A

Start menu;
Task bar;
Desktop; icons; shortcuts;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Command-line interface (CLI)

A t___-b_____ user interface that uses c_______ to i______ with the computer

A

text-based; commands; interact;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A _ _ _ is an interface that only allows you to make _ request at a time.

A _ _ _ allows you to make m______ requests at a time.

A

GUI; 1;
CLI; multiple;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Advantages of a CLI - E______: You can perform m______ tasks instead of just _. - H_____ f___: The Linux CLI records a h_____ f___ where the user can go back to ensure c_______ have been correctly u___.
Efficiency; multiple; 1; History file; history file; commands; used;
26
Security analysts use Linux by: - Examining different types of l___ to i______ what is going on in a system - To verify a_____ and a__________ in an i______ and a______ management system - To use d______ f_______ tools to investigate what happened following an event
logs; identify; access; authorization; identity; access; digital forensic;
27
Components of Linux - U___ - A________ - S____ - F________ H______ Standard - K_____ - H_______
User; Applications; Shell; Filesystem Hierarchy; Kernel; Hardware;
28
Shell - The c_______-l___ i________ - Allows users to give c_______ to the k_____ and receive responses from it.
command-line interpreter; commands; kernel;
29
Filesystem Hierarchy Standard (FHS) - The component of the L____ _ _ that o_______ data. - It specifies the l_______ where d___ is stored in the operating system.
Linux OS; organises; location; data;
30
Kernel The component of the L____ _ _ that manages p_______ and m_____
Linux OS; processes; memory;
31
Package manager A tool that helps users i_____, m_____, and r_____ packages or applications
install, manage; remove;
32
Package A piece of s______ that can be c_______ with other p_______ to form an a__________
software; combined; packages; application;
33
Directory - A f___ that organizes where other f____ are stored. - Directories are sometimes called 'f______'
file; files; folders;
34
Peripheral devices - Hardware components that are a_______ and c________ by the c_______ s______. - They are not c___ c_______ needed to run the computer system.
attached; controlled; computer system; core components;
35
Internal hardware includes: - The C____ P________ U___ (CPU) - R_____ A_____ M______ (RAM) - The h___ d____
Central Processing Unit; Random Access Memory; hard drive;
36
What type of components might be different from one Linux distribution to another? - Their p_____ d_________ - Their u___ i_______ - Their p__-i_______ p_____
parent distributions; user interfaces; pre-installed programs;
37
Penetration test A s_________ attack that helps identify v________ in s_____, n______, w______, applications and processes.
simulated; vulnerabilities; systems, networks, websites;
38
Penetration testing tools in KALI LINUX - M_______ - B___ S____ - J___ the R______
Metasploit; Burp Suite; John; Ripper;
39
Digital forensics The practice of c_______ and a______ data to determine what has happened a____ an attack
collecting; analyzing; after;
40
Digital forensic tools in KALI LINUX - t_______ - W_______ - A______
tcpdump; Wireshark; Autopsy;
41
KALI LINUX - Derived from D_____ - It should be used on a v_____ m______ - It contains many pre-installed t____ that can be used for c_________ tasks
Debian; virtual machine; tools; cybersecurity;
42
Ubuntu - An o___-s_____, u___-f______ distribution that is widely used in s______ and other industries. - D_____-derived - Has both a c______-l___ i_______ and a g______ u___ i_______. - Widely used for c___ c________
open-source, user-friendly; security; Debian; command-line interface; graphical user interface; cloud computing;
43
Parrot - An o___-s_____ distribution that is commonly used for security. - Comes with pre-installed tools related to p_________ t______ an d_____ f_______. - D____-based
open-source; penetration testing; digital forensics; Debian;
44
Red Hat Enterprise Linux - S_________-b____ distribution, built for e_________ use. - Not f___ - Offers a dedicated s_____ team for c_______ to call about issues.
Subscription-based; enterprise; free; support; customers;
45
AlmaLinux - A c_________-driven Linux distribution that was created as a stable replacement for C___ _ _. - C___ _ _ used s_____ c___ published by R__ H__ to provide a similar platform.
community; CentOS; CentOS; source code; Red Hat;
46
Package manager - A tool that helps users i_____, m_____, and r_____ packages or applications. - Linux uses m______ package managers
install, manage; remove; multiple;
47
Advanced Package Tool (APT) - A tool used with D____-derived distributions. - It is run from the c______-l___ i_______ to m_____, s_____ and i_____ packages.
Debian; command-line interface; manage, search; install;
48
Yellowdog Updater Modifier (YUM) - A tool used with R__ H__-derived distributions. - It is run from the c_______ l___ i_______ to m______, s______ and i______ packages. - Works with .rpm files
Red Hat; command-line interface; manage, search; install;
49
Types of Linux shells - B_____-A____ Shell (bash) - _ Shell (csh) - K___ Shell (ksh) - E_______ _ shell (tcsh) - _ Shell (zsh)
Bourne-Again; C; Korn; Enhanced C; Z;
50
Standard input Information received by the _ _ via the c______ l___
OS; command line;
51
echo A Linux command that outputs a s_______ s____ of t___
specified string; text;
52
String data D___ consisting of an ordered s________ of c_________
Data; sequence; characters;
53
Standard output Information returned by the _ _ through the s____
OS; shell;
54
Standard error E____ m_______ returned by the _ _ through the s____
Error messages; OS; shell;
55
Components of Linux Architecture: - The s____ - A_________ - The F________ H_______ S_______ (FHS)
shell; Applications; Filesystem Hierarchy Standard;
56
Some common Linux distributions include: - U_____ - D_____ - F_____ - L____ M___ - A___ L_____ - o___S___ - M______
Ubuntu; Debian; Fedora; Linux Mint; Arch Linux; openSUSE; Manjaro;
57
The _____ communicates with the k_____ to execute commands
shell; kernel;
58
Which of the following is an example of hardware? A) CPU B) Kernel C) Shell D) Applications
A) CPU
59
Root directory The h______-l____ directory in L____
highest-level; Linux;
60
pwd P_____ the w______ d______ onto the screen
Prints; working directory;
61
ls Displays the names of f____ and d______ in the current w______ d______
files; directories; working directory;
62
cd N______ between d_______
Navigates; directories;
63
cat Displays the c_____ of a f___
content; file;
64
head Displays just the b________ of a f___, by default _ _ lines
beginning; file; 10;
65
whoami Returns the u________ of the current u___
username; user;
66
An a_______ f___ path starts from the r___ A r_______ f___ path starts from the c______ d______
absolute file; root; relative file; current directory;
67
grep Searches for a s_______ f___ and returns all lines in the f___ containing a s________ string
specified file; file; specified;
68
| (piping) Sends the s_______ o_____ of one command as s________ i____ to another command for further processing | (piping)
standard output; standard input;
69
find - Searches for d________ and f____ that meet specified criteria. - Eg. entering find /home/analyst/projects searches for everything starting at the _________ directory.
directories; files; projects;
70
Worked example To find all files in the projects directory that contain the word "log" in the file name, you would enter:
find /home/analyst/projects -name "*log*"
71
-mtime This option can help security analysts find f____ or d_______ last modified within a certain t___ f____. Eg. to return all files and directories in the projects directory that have been modified within the past 3 days, you would enter:
find /home/analyst/projects -mtime -3
72
mkdir Creates a n__ d______
new directory;
73
rmdir R_____, or d______, a directory
Removes; deletes;
74
touch Creates a n__ f___
new file;
75
rm R_____, or d______, a file
Removes; deletes;
76
mv M____ a file or directory to a n__ l______
Moves; new location;
77
cp C____ a file or directory into a n__ l______
Copies; new location;
78
- The grep command is commonly followed by the s_____ to search for and the f___ to search through. - It is used to search f____ for specified s______
string; file; files; strings;
79
Permissions in Linux - R___ - W____ - E______
Read; Write; Execute;
80
Permissions are granted for three types of owners: - U___ - G____ - O____
User; Group; Other;
81
Write permissions allow users to create n__ f____ in that d_______
new files; directory;
82
Execute permissions allow users to enter into a d______ and access its f_____
directory; files;
83
ls -l Displays p________ to f____ and d________
permissions; files; directories;
84
ls -a Displays h_____ files
hidden;
85
ls -la Displays p_______ to files and directories, including h_____ files
permissions; hidden;
86
chmod Changes p________ on files and directories
permissions;
87
Principle of least privilege - The concept of granting only the m_______ a____ and a_________ required to complete a task or function.
minimal access; authorization;
88
Using chmod - The first argument indicates h__ to c_____ the permissions - The second argument indicates the f___ or d_______ that you want to c_____ the permissions for
how; change; file; directory; change;
89
Root user (or superuser) A user with e_______ p_______ to modify the system
elevated privileges;
90
Problems with logging in as root - S________ risks - I__________ mistakes - A__________
Security; Irreversible; Accountability;
91
sudo Temporarily grants e_______ p_________ to specific users
elevated permissions;
92
useradd Adds a _____ to a s______
user; system;
93
userdel D_____ a ____ from a system
Deletes; user;
94
usermod - M______ existing user accounts
Modifies;
95
User add/modify commands: -g: Sets user's default g____, also called their p______ group -G: Adds the user to additional g_____, also called s_________ or s________ groups -d: Changes the user's h___ d_______ -l: Changes the user's l____ n___ -L: L____ the account so the user can't log in
group; primary; groups; supplementary; secondary; home directory; login name; Locks;
96
chown - Changes o________ of a f___ or d______ 1) To change the user owner of the access.txt file to fgarcia? 2) To change the group owner of access.txt to security?
ownership; file; directory; 1) sudo chown fgarcia access.txt 2) sudo chown :security access.txt You must enter a colon ( : ) before security to designate it as a group name.
97
man Displays i_________ on other c_______ and how they work
information; commands;
98
apropos Searches the m_____ p___ d_________ for a specified string
manual page descriptions;
99
Database An organized collection of i___________ or d___
information; data;
100
Relational database A structured d_________ containing t_____ that are related to each other through p______ and f_____ keys
database; tables; primary; foreign;
101
Primary key A c______ where every r__ has a unique entry
column; row;
102
Foreign key A c_______ in a t____ that is a p______ key in another table
column; table; primary;
103
SQL (Structured Query Language) A p_________ l________ used to c____, interact with, and r______ information from a database
programming language; create; request;
104
Query A request for d___ from a d________ table or a combination of tables
data; database;
105
Syntax The r____ that determine what is correctly s________ in a computing language
rules; structured;
106
String data Data consisting of an o______ s________ of characters
ordered sequence;
107
INNER JOIN Returns r___ matching a specified c_____ that exists in more than one table
rows; column;
108
Types of outer joins - L___ J___ - R____ J___ - F___ O____ J___
LEFT JOIN; RIGHT JOIN; FULL OUTER JOIN;
109
LEFT JOIN - Returns all of the r_____ of the first table. - But only returns r___ of the s______ table that match on a specified c_____
records; rows; second; column;
110
RIGHT JOIN - Returns all of the r______ of the second table. - But only returns r___ from the f____ table that match on a specified c_____
records; rows; first; column;
111
Aggregate functions Functions that perform a calculation over multiple d___ p_____ and return the r_____ of the calculation.
data points; result;