My 11 year old daughter wants a facebook account. I told her if she read Hacking Linux Exposed (2nd Edition is what I have), I’d agree to it. However, I have to have a way to measure here understanding of what she read. So I devised a test. Below is the test I gave her.
**Hacking Linux Exposed Test**
Name the various types of hacking and describe the differences.
What is the difference between hacking and cracking?
Explain permissions. What is the command used to change permissions?
What is a sticky bit? And what is it used for?
Why use traceroute? What does it show?
What are the differences between trojans, worms, and viruses?
What are the 5 guidelines to avoid being socially hacked?
Name some ways to gain root access.
Name some boot loaders, and define what a boot loader is.
What is su and how is it different from sudo?
What is DDOS and DOS and what is the difference?
What is a race string?
How do you detect a buffer overflow?
Name some security issues with BIND.
How do you configure Xdm to be local only?
What port does X listen on? How do you close it?
What is an example of a good password? What is an example of a poor password?
Describe a man-in-the-middle attack.
What are the wireless encryption types?
Which is wireless encryption better and why?
What is a MAC?
What is MAC spoofing?
What is a VPN?
On a Linux system, where can you find the passwords? (hint: it’s at least 2 files)
What are the differences between hardlinks and symlinks? Give some examples.
What does PAM stand for, and what is PAM used for?
What are POP and IMAP?
What ports have root access?
What are INETD and XINETD? What are the differences? What do they do?
In regards to firewalls, what are the three things you can do with packets with the Linux firewall?
Give an example for dropping packets for port 515.
What is ACL?
What is a ROOTKIT? Describe what a ROOTKIT is and how it works.
I’m mean. Hahahahaha