CAE-CO
MKU
M6
CO-M6 Cybersecurity Foundations
Cyber operators must be able to describe the current cybersecurity threat landscape, including the various motivations, objectives, and methods of cyber threat actors.
Learning outcomes
What a student must demonstrate to claim coverage of this unit. Each outcome links to the skill drills that assess it.
- CO-M6-O1 Apply the principle of least privilege to system configuration and user management.
EWU courses that cover this unit
Exam questions that cite this unit
- CSCD240-E1-A-Q05 permissions-anatomy Describe what r, w, x, and - mean and what each group of three symbols means.
- CSCD240-E1-B-Q04 recon Print the groups your user belongs to.
- CSCD240-E1-B-Q07 setuid-effect What does the setuid bit cause when the file is executed? Use "effective user ID".
- CSCD240-E1-C-Q04 setuid A -rwsr-xr-x file owned by root. Execution causes what?
- CSCD240-E1-C-Q41 threat-reasoning -rwsrwxrwx root root .xhelper in /tmp. Why alarming?
- CSCD240-E1-C-Q46 malicious-alias .bashrc contains alias ls='rm -rf'. Consequence if planted and user opens a new shell?