Linux Chapter 14

¡Supera tus tareas y exámenes ahora con Quizwiz!

RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?

False

The private key is used when creating a digital signature. True or False?

True

Which command can increase the number of filehandles that programs can open in a shell? a. top b. lba32 c. ldd d. ulimit

ulimit

Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? a. AIDE b. Snort c. traceroute d. SWATCH

AIDE

The lspci command can be used to isolate problems with X Windows. True or False?

False

When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?

False

Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/sudoers c. /etc/su.cfg d. /etc/sudo.cfg

/etc/sudoers

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall-cmd --add-service ssh b. firewall-cmd --add-port 22/tcp c. firewall-cmd --add-port 22/udp d. firewall-cmd --add-service ssh -permanent

firewall-cmd --add-service ssh -permanent

Which command indicates the shared libraries required by a certain executable program? a. rpm -V b. ldd c. slconfig d. ldconfig

ldd

On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. reactive maintenance c. documentation d. proactive maintenanc

monitoring

Which of the following commands can be used to scan the available ports on computers within your organization? a. traceroute b. sudo c. tracert d. nmap

nmap

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. sa39 b. sa19 c. 15 d. 00

sa19

Which of the following steps is not a common troubleshooting procedure? a. Delegate responsibility. b. Test the solution. c. Isolate the problem. d. Collect information

Delegate responsibility

What are best practices for securing a local Linux server?\ a. Set the default run level to 1 (Single User Mode). b. Keep the server unlocked and in plain sight. c. Ensure that you are logged in as the root user to the server at all times. d. Ensure that SELinux or AppArmor is used to protect key services.

Ensure that SELinux or AppArmor is used to protect key services.

Which of the following actions should you first take to secure your Linux computer against network attacks? a. Run a checksum for each file used by network services. b. Configure entries in the /etc/sudoers file. c. Ensure that only necessary services are running. d. Change permissions on key system files.

Ensure that only necessary services are running.

What type of iptables chain targets traffic that is destined for the local computer? a. OUTPUT b. FORWARD c. INPUT d. ROUTE

INPUT

What will the command sar -W 3 50 do? a. Take 3 CPU statistics every 50 seconds. b. Take 50 swap statistics every 3 seconds. c. Take 3 swap statistics every 50 seconds. d. Take 50 CPU statistics every 3 seconds.

Take 50 swap statistic every 3 seconds

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad? a. good, because the processor is idle 90% of the time b. bad, because the processor is idle 10% of the time and perhaps a faster CPU is required c. bad, because the processor is idle 10% of the time and perhaps a new hard disk is required d. good, because the processor should be idle more than 5% of the time

bad, because the processor is idle 10% of the time and perhaps a faster CPU is required


Conjuntos de estudio relacionados

benchmarks one and twoWhich is the BEST example of an organism maintaining homeostasis?

View Set

Most missed topics quiz on alex and rome

View Set

Introduction to Entrepreneurship

View Set

N 360 Congenital Heart Defects Pearson questions

View Set

HCI-112 Chapter 1 What Is the Electronic Health Record?

View Set

Lesson Three and Four World Geography

View Set