Welcome to your KLCP_Quiz
CH-11
Which of the following (derived from likelihood of occurrence and impact) provides guidance to those responsible for securing and maintaining the systems in question?
CH-9
Which command will execute the graphical kernel configuration tool?
CH-8
Which command should be used for regular updates of Kali Linux and will remove obsolete packages and install new dependencies?
CH-4
True or False: The Kali Linux installation will fail if you do not select a network mirror.
Place the chains in the proper processing order, from first to last:
CH-7
Which of the following commands is used to delete all rules in the INPUT chain?
Which of these actions can be used to submit a bug to the Debian developers? Select all that apply.
CH-3
How can the file permissions -r---w be represented in octal notation?
CH-4
Which partitioning method is preferred for servers and multi-user systems?
CH-5
Which command is not a postgresql command?
CH-10
Which of these commands will execute 'uptime; uname -a' on the kali-scratch minion?
CH-9
Which command will retrieve sources from a GIT repository?
CH-4
Installing a modern version of Windows after a Kali installation will:
CH-5
Which command will suspend a user account?
CH-4
Which method is not readily available for saving debug logs during a failed install?
CH-3
Which character is used to represent the user's home directory?
CH-11
Which of the following are not a part of the 'CIA triad'?
CH-5
The interfaces file is an important part of command-line network configuration. What directory is it in?
CH-5
Which command is used to add users to the system?
CH-8
Which of the following is not a part of a standard Debian package?
CH-10
Which file should be updated on client machines wishing to access a custom repository?
CH-8
Which of the following repositories is recommended for most users?
CH-9
Which file contains the data of persisted directories?
CH-11
A flaw has been found in a cryptographic algorithm that weakens the cryptographic system. Which of the following elements of the CIA triad are affected by this?
CH-8
Which of the following is not a valid Debian package configuration script?
CH-5
Which command is commonly used to start services like ssh and postgresql?
CH-4
Generally speaking, which of these is not a minimum requirement for a Kali Linux desktop?
CH-3
Which command does not control the permissions or user attributes associated with a file?
CH-8
Which file contains the most vital information about a Debian package?
CH-8
Which of the following commands shows the architectures that are installed on the current system?
CH-9
Which command will install the prerequisites for the Kali Linux build environment?
CH-3
According to the FHS, which directory contains log files, queues, spools and cache data handled by daemons?
CH-6
Which command will determine if nmap has been modified by Kali?
CH-10
Select all of the fields required in a repo configuration file:
CH-1
The most current version of Kali is:
CH-5
Which is true of the SSH service on a default Kali install? Select all that apply.
CH-2
Which command will download and import the Kali public key over https?
CH-5
Which command can be used to create a new postgresql database?
CH-5
In Kali, what is responsible for the boot sequence, but also permanently acts as a full featured service manager, starting and monitoring services?
CH-5
What is the name of a command-line package typically used in Kali to configure the network from the command line?
CH-8
Which tool is a complete package management system designed to to install and remove applications, update packages, and even upgrade your entire system?
CH-3
Which of the following files is not a block or character device?
CH-7
Which of the following can be used to protect against brute-force logins?
CH-4
Which is the recommended configuration for simple Intel-based Kali SSH server with no desktop (headless)?
CH-8
Which of the following commands will display the name of the package that installed the file 'msfconsole'?
CH-8
Which of the following commands downloads the latest list of available packages and should be run before working with apt?
CH-8
Which apt source description points to software that does not conform to the Debian Free Software Guidelines?
CH-7
Which easily-subverted command can be used to detect suspicious packages?
CH-9
Which of the following commands will download the source of a Debian package?
CH-7
Which of the following commands will block all packets originating from 8.8.8.8?
CH-9
Which of the following will add a 'nuke' password to the LUKS partition on /dev/sdb4?
CH-10
Which of the following commands will generate a binary package from an unsigned source package with unsigned .buildinfo and .changes file?
CH-11
Which of the following best describes software that can be used to take advantage of a security weakness?
CH-11
Which of the following best describes a technique that is used to target the various applications installed on the workstation of an employee within a target organization?
CH-11
Which of the following leverages identified issues to uncover the worst-case scenario?
CH-10
Which command is used to create and manage Debian repositories?
CH-7
Which of the following will apply a special case of source NAT to packets in the Kali Linux firewall?
CH-2
When installing Kali Linux to a virtual machine, which installation method will most likely produce a clean install?
CH-3
You have two jobs running in the background. How do you kill the first job you executed?
CH-9
When applying changes, which command will update the prefix used in a Debian package to 'kali'?
CH-4
What is the purpose of preseed.conf?
CH-8
Which is the key configuration file for defining package sources?
CH-5
You can use GNOME's control center to graphically set network options with which tool?
CH-7
Which tool can be used to graphically monitor process status?
CH-8
Which of the following commands will list all packages installed on the system?
CH-9
Which command could prepare a LUKS container on /dev/sdb3 for user interaction?
CH-8
Which command will show all the files installed by the metasploit-framework package?
CH-7
Which file should be updated to enable custom firewall rules at boot-time?
CH-4
Which partitioning scheme is most likely to be affected by user error?
CH-3
Which tools can be used to get file information? Check all that apply.
CH-3
Which command displays the identity of the user running the session along with the list of groups they belong to?
CH-9
Which file or command will reveal whether or not your changes to a Debian package 'stuck'?
CH-3
Which command summarizes the PCI hardware through the /proc and /sys virtual filesystems?
CH-11
An organization owns a web server which generates revenue based on uptime. Which of the following security attributes of the system will be the primary focus of the organization?
CH-7
Which of the following are associated with the Kali Linux firewall? Select all that apply.
CH-8
Which file in a Debian package contains the actual files to be installed on the file system?
CH-9
Which command will create an EXT3 filesystem with a label of "persistence" on the third partition of the third drive attached to the system?
CH-8
Which of the following are graphical front ends to Kali's package manager?
CH-10
Which of the following commands will install the dnmap package on salt minions?
CH-8
Which command will install the man-db package?
CH-2
How can you determine whether the CPU in your Kali Linux machine is 32 or 64-bit?
CH-9
What is the proper command for copying the config file from a running Kali Linux instance to a downloaded Kali source tree in the current directory?
CH-10
Which of the following are required to install Kali over the network on a machine without an operating system?
CH-9
A user on a 32-bit operating system wishes to create a custom Kali Linux ISO image for the 64-bit architecture with the XFCE desktop environment. Assuming they are in the "live-build-config" directory, which command will accomplish their goal?
CH-5
Which command will inspect the current status of the postgresql service?
CH-8
Select the syntactically correct apt source description:
CH-5
Which of the following are not associated with Apache2? Choose one.
CH-7
Which of the following will explicitly allow SSH connections to your Kali Linux machine?
CH-5
Which file contains encrypted user passwords?
CH-5
Which methods can be used to configure network devices in Kali Linux? Choose all that apply:
CH-4
True or False: When booted from the mini.iso, the Kali Linux installation will fail is network hardware can not be detected.
CH-8
You need to install a package for a CPU other than the one on the current system. How would you enable this?
CH-3
Based on the following partial directory listing, what permissions does user have on the file test? -r-x--x--- 1 user root 0 Mar 24 01:19 test
-r-x--x--- 1 user root 0 Mar 24 01:19 test
CH-5
Which of the following are not associated with Apache2?
CH-9
Which metapackage installs all the tools in the default Kali Linux installation?
CH-8
Which field in the package header will cause dpkg to refuse to install a package and trigger apt to resolve the problem by updating the incompatible package to a newer version?
CH-9
Assuming that you are in a directory containing an unpacked source package, which command will install build dependencies listed in the Build-Depends field of the debian/control file?
CH-5
When configuring a network from the command line (say with ifup or ifdown) which line will begin the section for a manual network configuration?
CH-8
Which tool directly installs packages without regard for dependencies or other packages?
CH-7
Which of the following is a default chain in the Kali Linux firewall?
CH-6
Which command is used to report a bug to the Kali Linux developers?
What is the simplest and most effective procedure for installing Kali on an ARM device?
CH-7
Select all of the built-in security functions of a default installation of Kali Linux:
CH-5
Which command will create a postgres database name db_new?
CH-2
If you have a 64-bit Intel desktop, which Kali image will boot on your machine? Select all that apply.