Vulnerabilities
Access Control
Incident Response
Best Practices
100

This permission setting  allowed anyone on the system to modify or delete files in the sibshared directory.

What is 777 ?

100

This Linux command shows which users belong to the sudo group.

What is grep sudo /etc/group?


100

This is the first action you should take if an auditor discovers a user with unexpected sudo privileges.

What is immediately remove the user from the sudo group?

100

For enhanced security, you should prioritize implementing this authentication method before file integrity monitoring.

What is multi-factor authentication?

200

This SSH configuration setting allowed attackers to gain immediate full control of the system if compromised.

What is PermitRootLogin yes?

200

Group-based permissions are preferred over individual permissions for this primary reason in large teams.

What is simplified administration and consistent privilege management?

200

After removing unauthorized sudo access, you should check these system records to identify any unauthorized actions taken.

 What are system logs (auth.log, sudo logs, syslog)?

200

Strong password policies should enforce this minimum character length according to security best practices.

What is 8 characters (or longer)?

300

This security principle was violated when multiple employees were given unnecessary sudo privileges.

What is the principle of least privilege?

300

In role-based access control, users are assigned permissions based on this factor rather than individual identity.

What is their job role or organizational function?

300

If you discover a directory with 777 permissions containing sensitive data, these are the two immediate steps to take.

What are change permissions to restrictive settings (750) and audit who accessed the directory?

300

This often-overlooked security practice involves regularly reviewing logs and system configurations to detect attacks and misconfigurations.

What is continuous auditing and monitoring?


400

Name two impacts of having weak password policies with no minimum length or complexity requirements.  

What are increased risk of brute force attacks and credential compromise? 

400

This special permission bit ensures that files created in shared directories maintain the same group ownership.

What is setgid (set group ID)?

400

What log file would you check first if you suspect unauthorized login attempts on your Linux server?

What is /var/log/auth.log ?

400

 Name three elements that should be included in a comprehensive password policy.

 What are minimum length, complexity requirements, expiration periods, password history, and account lockout policies?