Romancing the Penguin: Raiders of the Lost OS

Every action/adventure story has its heroes and villains, and this episode, Romancing the Penguin: Raiders of the Lost OS is no exception. Can you spot the white hats and black hats among the Red Hats (and other variations)? This week, we offer you security-related clues about the penguin's friends and foes.

Save the penguin! Every action/adventure story has its heroes and villains, and this episode, Romancing the Penguin: Raiders of the Lost OS is no exception. Can you spot the white hats and black hats among the Red Hats (and other variations)? This week, we offer you security-related clues about the penguin's friends and foes.

1. Forrester Research published a report (which was rebutted by Linux and GNU vendors) questioning whether Linux was really more secure than this operating system.
What is it?

2. According to security experts, as Linux becomes ever more widely used in business environments, it's likely to become a more frequent target of these attacks.
What is it?

3. A denial of service (DoS) vulnerability was reported in January by this German Linux distributor and Novell partner.
What is it?

4. This open source operating system was recently released in a new "security enhanced" version.
What is it?

5. This type of security management system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches.
What is it?

6. This open source network intrusion detection system is often used in conjunction with Linux.
What is it?

7. In January, Red Hat put out a warning about a vulnerability to this kind of attack in Apache servers, in which the attacker sends more data than can be held in the temporary storage area.
What is it?

8. According to the NetFilter project, a Linux server subsystem can be set up to substitute for this security product.
What is it?

9. SE Linux was developed by this agency, the official U.S. cryptologic organization.
What is it?

10. Considered the foremost security specification document in the world, this is a generic set of best practices for the security of information systems.
What is it?

If you liked this quiz, take the other quizzes in the series and get two more chances to win:
- Romancing the Penguin
- Romancing the Penguin, part 2 (The Lovers)

Dig deeper on Linux news and updates

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchDataCenter

SearchServerVirtualization

SearchCloudComputing

SearchEnterpriseDesktop

Close