Linux Security Quiz – SSH, Audit, and SSL/TLS Configuration (Set V)

1. Which command is used to add audit rules dynamically?

  • A auditd
  • B auditctl
  • C logrotate
  • D sysctl

2. iptables -A INPUT -p tcp –dport 22 -j LOG –log-prefix "SSHattempt:" --log-level 4What is the purpose of the above IPTABLES rule?

  • A

3. What is the purpose of the ausearch command?

  • A To search audit logs based on criteria
  • B To rotate logs
  • C To encrypt log files
  • D To monitor disk usage

4. Which log file typically contains authentication attempts?

  • A /var/log/messages
  • B /var/log/auth.log
  • C /var/log/syslog
  • D /var/log/boot.log

5. What is the best practice for securing log files?

  • A Enable public access
  • B Store logs in /tmp
  • C Restrict access to root or admin users
  • D Delete logs daily

Please enter your name