Linux Security Free Practice Test — 30 Questions

30 questions · Full explanations · No account required

Free
Question 1 of 30

Anya, a seasoned Linux administrator, is tasked with fortifying a new e-commerce platform hosted on a cluster of RHEL servers. The platform processes significant volumes of personally identifiable information (PII) and financial transactions, necessitating strict compliance with regulations such as the Payment Card Industry Data Security Standard (PCI DSS) and the General Data Protection Regulation (GDPR). Anya must implement a security framework that not only meets these compliance mandates but also remains agile enough to counter emerging cyber threats without hindering the development team\'s agile workflow. She needs to prioritize proactive threat detection, granular access control, and robust data protection mechanisms. Which of the following approaches best embodies Anya\'s need for adaptable, compliant, and effective Linux security?

Implement a comprehensive security strategy incorporating mandatory access control (MAC) via SELinux with targeted policy modules, robust network segmentation using `iptables` for ingress/egress filtering, centralized logging with `auditd` and SIEM integration for anomaly detection, and regular vulnerability scanning and patching cycles, while maintaining open communication channels with the development team for timely security integration into the CI/CD pipeline.
Focus solely on perimeter security by deploying a hardware firewall and disabling all non-essential services, assuming that a strong external defense will adequately protect the internal systems and data, and deferring any complex internal security configurations until a specific incident occurs.
Rely exclusively on application-level security controls provided by the web framework, assuming that the application itself is inherently secure and requires minimal underlying system-level hardening, and only address operating system vulnerabilities as they are reported by external security researchers.
Implement a reactive security model by enabling intrusion detection systems (IDS) that generate alerts for known attack signatures, and manually respond to each alert as it arises, without proactively hardening the system or establishing granular access controls beyond default user permissions.

About the Linux Security Certification

These free practice questions are designed to help you assess your readiness for the Linux Security exam by Linux. Each question comes with a detailed explanation to reinforce the correct concept. For a complete exam preparation experience with hundreds of questions, spaced-repetition study tools, and full exam simulations, explore our premium access.