Preview

IS3440 Assessment Lab07

Powerful Essays
Open Document
Open Document
411 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3440 Assessment Lab07
Assessment Worksheet
Hardening Security for the Linux Kernel

IS3440
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________

Overview
In this lab, you viewed and tuned all kernel parameters and discovered information regarding the current Loadable Kernel Modules (LKMs) and about the kernel itself. You explored the sysctl.conf file and made modifications to system settings. Finally, you enabled and interpreted the results of the lsmod command.

Lab Assessment Questions & Answers
1. What is the command to view the current Linux kernel parameters? cat /etc/sysctl.conf

2. Which command can you run to list all the kernel’s available parameters one screen at a time with the ability to move forward and backward on the output?
/sbin/sysctl -a | less

3. What is the purpose of enabling SYN cookies in the Linux kernel?
To harden the kernel security; it tunes the kernel parameters against the SYN flood attack.

4. If you wanted to limit the number of files that a user can open simultaneously on the
CentOS Linux Server to a maximum of one, what is the command syntax you need to enable in the Linux kernel? su -c '/sbin/sysctl -w fr.file-max=1

5. What is the best way to make a systemwide permanent change to the kernel to enable
SYN cookies?
Open the /etc/sysctl.conf file with vi Editor, make changes to settings, and reboot the system.

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

6. Your boss wants you to make sure a freshly installed system is up to date and locked down at the kernel level. Which command would you use to load a new module?
Which command would you use to remove an unwanted module? su -c '/sbin/modprobe

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * Use A to select all of the commands in the edited device configuration file. Use C to put the commands in the clip board. Paste these commands into the table cell below with V.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Why is it important to put the swap file on a separate partition from the root (/)partition?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    b. SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number, and the sequence number that the server chooses for the packet is another random number.…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1430 Unit 2 Discuss

    • 401 Words
    • 2 Pages

    The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux distributions without having to go through extra effort. This matches their experiences on other popular platforms, such as Windows or Mac OS X. In addition, application developers want to ensure that the platform as a whole does not diverge. Even if an application works on today's distributions, will it work on tomorrow's? The LSB workgroup has, as its core goal, to address these two concerns. We publish a standard that describes the minimum set of APIs a distribution must support, in consultation with the major distribution vendors. We also provide tests and tools which measure support for the standard, and enable…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following is a GPO on a Vista computer (Choose all that apply)…

    • 1935 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4680 Lab 4 Q&A

    • 1180 Words
    • 4 Pages

    1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today’s Internet world?…

    • 1180 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    2. A single drive would be fine. With more than 1 root folder you could add additional drives.…

    • 465 Words
    • 2 Pages
    Good Essays
  • Better Essays

    4) Assume that a pseudocode program contains the following module: Module display( Integer arg1, Real arg2, String arg3) Display " Here are the values:" Display arg1, " ", arg2, " ", arg3 End Module…

    • 1580 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    IS3110 Week5 Lab

    • 503 Words
    • 2 Pages

    1 How do documented back-up and recovery procedures help achieve RTO? By recording and applying backup and recovery procedures that are listed, the recovery process is a lot smoother of a process, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays

Related Topics