Topic
Fundamental security design principles as applied to an OS (e.g., System Hardening, Domain separation, process isolation, resource encapsulation, least privilege)
Skill drills that cover this topic
- CSCD240-E1-A-Q41 essay setuid Explain the setuid bit in 1-2 sentences using the term "effective user ID".
- CSCD240-E1-A-Q42 performance chmod-recursive Recursively change permissions in current dir so group and other have no write permission.
- CSCD240-E1-B-Q06 short_answer permissions-special Owner triad shows rws instead of rwx. Name the bit.
- CSCD240-E1-B-Q07 essay setuid-effect What does the setuid bit cause when the file is executed? Use "effective user ID".
- CSCD240-E1-B-Q09 performance octal-special Convert rwsr-xr-x to 4-digit octal including special bits.
- CSCD240-E1-C-Q04 multiple_choice setuid A -rwsr-xr-x file owned by root. Execution causes what?
- CSCD240-E1-C-Q16 multiple_choice permissions-special What does the sticky bit on a directory do?
- CSCD240-E1-C-Q42 scenario chmod-recursive-trap chmod -R 644 /etc/ssh — what broke and why?