What are the basic exploits of a Linux system?

What will be an ideal response?


The basic hacks for a Linux system start with physical access, so the first security measure is to lock down physical access to your Linux servers. It is a good idea for all servers to be kept in a room with good security and restricted access. If this is impossible, then you must take care in selecting start-up options in your basic input/output system (BIOS) setup.?Even if you protect your operating system with complex passwords and other security measures, the system is still vulnerable to hacking attempts. Set your computer to start only from the hard drive, and set a BIOS password so an attacker cannot easily boot your computer from a floppy disk or a CD-ROM. This is actually a hardware hack and not related to the operating system you have installed. You can hack into any x86 architecture machine if you have a bootable floppy or CD-ROM.

Computer Science & Information Technology

You might also like to view...

Which of the following is the normal Excel file format?

A. .excl B. .xlsx C. .xcl D. .exl

Computer Science & Information Technology

Windows _____ is a Microsoft closed source operating system

Fill in the blank(s) with correct word

Computer Science & Information Technology

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode.   Which of the following cable combinations will meet these requirements?

A. Coaxial cable with BNC connectors B. Cat6 STP cable with RJ-45 connectors C. Multimode fiber cable with MT-RJ connectors D. Cat5e UTP cable with RJ-45 connectors

Computer Science & Information Technology

Used to verify communication with the PAC, the ____________________ screen displays an X through the controller if communications were established at one point but have currently been lost.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology