[NTLUG:Discuss] I PASSED... I'm an LCA

Jeremy Blosser jblosser-ntlug at firinn.org
Thu May 31 23:50:32 CDT 2001


Chris Cox [cjcox at acm.org] wrote:
> I'm looking at getting my LCI (Linux Certified Instructor).
> There are only 59 in the world today.  That was why I went
> through all of this to begin with.

Are the sample questions on their web site an accurate sample of the test
quality?  I just took a look at those, and was a bit underwhelmed.

Some examples, all from the 'security and ethics' test:

 "Select the least secure host from the list below.

 A.A multi-user system that is connected to the Internet directly but runs
 only a minimum number of services, all of which are started by TCP wrappers
 B.A multi-user system that is connected to the Internet through a firewall,
 which runs a minimum number of services.
 C.A single-user system that is used primarily as an NFS server, that is
 connected to the Internet directly, and that only runs NFS services
 D.A single-user system that is used primarily as a development server and
 that is connected to the Internet through a firewall, which runs a minimum
 number of services

 Explanation : Answer C is correct. With NFS, a client can log in and mount
 the server file systems, and then read or change files stored on the server
 without having to log in or enter a password. NFS also uses a weak form of
 authentication, and can be easily spoofed. Any system behind a firewall
 will be much more secure then a system directly connected to the Internet
 because the number of potential intruders is decreased exponentially. This
 eliminates answers B and D. TCP wrappers are a powerful tool for minimizing
 the number of hosts who have access to a system."

Er, huh?  This one just has to be a typo or something.  D is connected
through a firewall, for one thing, so the bit about not being behind a
firewall eliminating D makes no sense.  They say the NFS server is the
answer, then give all the reasons NFS is insecure.  Etc.

 "Of the following examples, which would be the best example of physical
 security? 

 1. Computer Locks
 2. BIOS Security
 3. Boot Loader Security (example - LILO)
 4. xlock and vlock

 A.1
 B.1 & 2
 C.2 & 3
 D.1,2 & 3
 E.1,2,3 & 4

 Explanation : Physical security of a machine is the protection of
 unauthorized persons from logging into the physical terminal. All four
 examples help in preventing unauthorized persons from logging into the
 machine."

All help, but that wasn't the question.  The question was 'which would be
the best'.

 "Which of the following is the most secure method for a system
 administrator to log in as root to a host? (This host may be accessed
 through the local area network if necessary.)

 A.Use the "rlogin" command.
 B.Use the "ssh" command.
 C.Use Telnet.
 D.Log in as root at the physical terminal.
 E.All of the above are equally suitable options.

 Explanation : Answer D is correct. Using rlogin, ssh, and telnet place the
 root password on the network, subjecting it to potential snooping. Further,
 rlogin relies on the "trust" of another host and can be easily fooled.
 Secure shell is probably the next best choice because it uses encryption to
 protect the data. It is still feasible, however, that someone could decrypt
 the message. Telnet transmits data in plain text which can easily be
 intercepted by a password sniffer. Physically logging onto the terminal is
 the only method that totally prevents network snooping of the root
 password."
 
Maybe this is just a poorly worded question, but saying the host may be
accessed through the network implies that that is relevant to the question,
ie. that we're talking about the most secure method that still allows
remote access.  Also, root should not be allowed to login directly even at
the console, which is the reasonable interpretation of "log in as root at
the physical terminal".

 "It is ethical for a network administrator to read other users' e-mail
 without permission on a server that he is administrating.

 A.True
 B.False

 Explanation : Answer A is correct. The Electronic Communications Privacy
 Act specifically grants this right to authorized personnel. Courts have
 generally ruled that there is no reasonable expectation to privacy and,
 further, states that employers have the right to read e-mail to protect
 their interests."

This is no doubt debatable, but the phrasing of the question certainly
implies that they're asking about a sysadmin doing this at their own whim,
and not just as part of their authorized duties (I guess we're supposed to
intuit that 'without permission' just means 'without the user's permission,
but with the permission associated with your job').  Trick question?  Even
if technically correct, if people are being quizzed on ethics, the standard
should be quite a bit higher than 'the bare minimum the law allows'.

 "While monitoring routine network traffic, a network administrator notices
 that a user is violating the company's appropriate use policy. As part of
 his job, the network administrator is expected to report any violations of
 the policy.  From an ethical standpoint, who should the network
 administrator inform about the violation?
 
 A.The person who has violated the policy
 B.The boss of the person who has violated the policy
 C.The owner of the company
 D.The network administrator's boss
 E.Both a and b
 F.All of the above

 Explanation : Everyone listed here can be notified of the of the violation,
 especially since an appropriate use policy (by convention, a statement of
 rights, privileges, and consequences) is in effect. However, notification
 does not mean that the inappropriate material can be shown to everybody in
 the list.  NOTE: This question does not address the issue of
 chain-of-command with respect to company policy.  Jumping the
 chain-of-command is a separate issue from the ethics of monitoring system
 activity and should be respected per company policy."

Also debatable I guess, but I don't think you can even attempt to really
answer this one without knowing what the company policy is.  If you work in
a company of a few thousand people, notifying the owner and everyone else
of one AUP violation makes no sense and is an unnecessary (and probably
unethical) embarassment to the offender.  It's also doubtful it would be
appropriate or ethical for the admin to take it up with the user directly
instead of referring it through those responsible for dealing with such
things.

Their explanation says "can be notified", and in that case "all of the
above" is correct, but again, the question didn't ask who can be, it asked
who should be.

-- 
Jeremy Blosser



More information about the Discuss mailing list