LPIC-2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Where are you most likely to find a Linux driver for a 3-year-old Ethernet card from a major manufacturer?

In the standard Linux kernel

True or false: tar, cpio, dd, and rsync can all be used to back up files in Linux.

True

Virtual hosts are used to host websites for multiple domains on the same Apache server.

True

Web servers are configured to listen on TCP Port 80 for HyperText Transport Protocol (HTTP) and TCP Port 443 for HyperText Transport Protocol Secure (HTTPS)

True

You can use the uname command to obtain information about the linux kernel that you are currently running.

True

You've added a new server, someserver, to a SysV-based distribution that uses chkconfig for startup script management. How can you ensure that someserver runs at startup in its default runlevels?

Type chkconfig --add someserver

It is possible for a Dynamic Host Configuration Protocol server to assign a fixed IP address to a host using ________ .

a reserved IP that is based on the MAC address of the host

Which command would you use to reboot the kernel?

init 6

Which command is used to manage firewall settings?

iptables

After the configure script has been run, the _____ command is used to compile the kernel.

make

Upon typing lsmod, you see a long list of loaded modules, many of which you don't recognize. What utility can you use to determine some basic information about these unknown modules?

modinfo

Which one of the following commands is referred to as the "Swiss Army Knife" of network tools by your textbook?

netstat

What option can you set in /etc/dhcpd.conf to tell DHCP clients that their domain name is example.com?

option domain-name "example.com"

Which of the following commands would be used to list all of the partitions on a hard drive called sdc?

parted /dev/sdc print

If the BOOTPROTO argument in a network configuration file is set to equal static, it is necessary to explicitly specify an IP address, A netmask, a network address, a broadcast address, and a gateway address.

true

In a PAM configuration file, modules are executed in the order listed

true

Snort should be used on a network Snort should be used on a network that uses hubs to connect hosts together or with a switch that is capable of echoing all traffic to Snort.

true

The PAM modules that support LDAP are part of the LDAP package and not included with the default PAM configuration.

true

The kernel ring buffer contains messages from the kernel that can be accessed using the dmesg command.

true

The tcpdump utility is a packet sniffer which can intercept network packets and log them or display them on the screen.

true

Transmission Control Protocol (TCP) Port 80 is used as a listener for HyperText Transport Protocol (HTTP) traffic

true

Wireshark is a packet sniffer which can intercept network packets and log them or display them on the screen .

true

What action must you take after editing the /etc/lilo.conf file, assuming this file is relevant to your installation?

type lilo-install as root.

_____ is a tool that can simplify the maintenance of a Wi-Fi connection.

wicd

You want to change the name of the filesystem on /dev/sda3, which uses XFS. What command would you type to change this filesystem's name to Home?

xfs_admin -L Home

The _______ file contains configuration information for the Dynamic Host Configuration Protocol (DHCP) server.

/etc/dhcpd.cont

Which of the following files is used to describe the directories that an Network File System (NFS) Server exports?

/etc/exports

Which of the following files would most likely contain configuration information for an Apache Web server?

/etc/httpd/conf/httpd.conf

Which of the following files would most likely contain configuration information for an Apache web server?

/etc/httpd/conf/httpd.conf

Where is the Snort configuration information normally stored in Linux?

/etc/snort/snort.conf

In what file do you find the OpenSSH server's settings on most Linux systems? /etc/ssh/ssh.conf /etc/ssh/sshd_config /etc/ssh/ssh_config /etc/ssh/config

/etc/ssh/sshd_config

Where are the Samba log files normally located by default?

/var/log/samba

Which one of the following statements are true about Procmail?

(ALL) Procmail is a mail delivery agent capable of sorting mail using a complex rule base. Procmail can be used to filter out spam messages. According to the latest information on the Internet, Procmail is stable but no longer maintained.

In Linux operating systems that use SysV startup scripts, which of the following can be accomplished with the chkconfig command?

(all) It can list services and their applicable runlevels. It can modify the runlevels for a given service. It can add a service to the list of services that are run at startup.

Which of the following statements are true: 1.RAM tools and procedures are stable from one distribution to the next. 2.You always need to install an initial RAM disk. 3.You can prepare a kernel package to maintain many Linux systems.

3

A new server is arriving at the end of the week. It will have four 1 TiB hard drives installed and configured in a RAID 5 array with no hot standby spare drives. How much data can be stored within this array?

3 TiB

Which of the following options can be implemented when open ports are detected on a Linux system during a port scan?

ANY Leave the open ports open. Close the port by disabling or removing the software that keeps it open. Block the port using a firewall.

For best SSH server security, you should set the Protocol option in /etc/ssh/sshd_config to 3

False

To preserve the standard for share names in Windows, Samba share names are referred to using the following convention: \\SERVER\SHARE Where SERVER is the host name of the server and SHARE is the name of the shared directory

False

To use a computer as a router, you must configure it to use three or more network interfaces.

False

When Linux mounts a filesystem, it records this fact in /etc/fstab, overwriting all previous configuration information.

False

The executable boot loader code may be found in any of the following locations except?

Files in /boot/grub

In today's Internet environment, mail servers should never be configured as mail relays because of security considerations.

False

What is the DEFAULT method of encrypting passwords in LDAP?

Cleartext

Samba doesn't support printer sharing.

False

Sally, a Linux administrator, has typed lspci -vs 5:8.0. Assuming Sally typed the correct command, what type of information was she seeking?

General hardware information on the PCI device in bus 5, slot 8

Which of the following statements best describes the purpose of Hyper Text Markup Language (HTML)?

HTML is a tag-based language that is used to control how content is displayed by a web browser.

When configuring a virtual private network using OpenVPN, which of the following steps would you typically do first?

Install OpenVPN using your package manager.

What is the purpose of the vgmerge command?

It merges two LVM volume groups into one volume group.

What does the acl option in /etc/exports do?

It tells the NFS server to share access control list (ACL) permissions with the client.

Which of the following statements best describes Lightweight Directory Access Protocol (LDAP)?

LDAP is a network authentication protocol.

Which of the following is a form of Redundant Array of Inexpensive Disks (RAID) that creates an exact copy of one disk's contents on one or more other disks? RAID 0 RAID 1 RAID 5 RAID 6

RAID 1

Which of the following statements are true of SSH? (Choose all that apply) *Most default configurations allow root to log in directly. *Encryption makes SSH safer than Telnet. *The default port used is 53. *By default, SSH uses UDP.

Most default configurations allow root to log in directly. Encryption makes SSH safer than Telnet.

Which of the following terms refers to a unique 48 bit binary address, expressed in hexadecimal, that is assigned to each Network Interface Card during its manufacturing process?

Physical Address Hardware Address Media Access Control (MAC) Address

Which well known port is assigned for use by mail servers to send unencrypted mail traffic?

TCP Port 25

What type of information is stored in the uid field of an LDAP Linux account definition?

The Linux username

What is the effect of the following /etc/fstab entry? LABEL=sda5 /mnt/shared auto noauto 0 0

The filesystem named sda5 is associated with /mnt/shared, but is not mounted automatically

What types of information are commonly stored in the first hard disk's MBR? (Select all that apply.)

The first-stage boot loader code The MBR partition table

Which of the following correctly applies to TCP Wrappers?

The format for entries in both /etc/hosts.allow and /etc/hosts.deny are identical.

After activating and SSH server, you might consider retiring, Telnet and FTP servers, but not SMTP or NFS servers.

True

For the purposes of this course, a firewall can be defined as a computer or software configuration that selectively rejects certain types of network traffic.

True

In a large local area network, a "best practice" is to assign static IP addresses to all computers. That way, they will keep their own IP addresses until those addresses are changed by network administrators.

True

In order to view directories and files on an NFS server, an NFS client is required.

True

In passive mode, the ftp client initiates both the data port connection and the command port connection.

True

Ordinary users (users other than root) can be given the ability to mount certain partitions or removable media.

True

Partitions, as traditionally used on most computers, are inflexible and composed of contiguous sets of free sectors.

True

Simple Mail Transfer Protocol (SMTP) is only used to deliver mail to a mailbox on a destination mail server. Once the mail has been delivered to the mailbox on the local mail server, a client such as Post Office Protocol 3 (POP3) or Internet Message Access Protocol (IMAP) is used to retrieve it.

True

Which of the following symptoms would most likely result from a complete Dynamic Host Configuration Protocol server failure on a local network of Linux machines?

When you execute the ifconfig command on your computer, it doesn't return an IP address for the eth0 interface.

How would you enable routing in a Linux system?

You would edit the appropriate configuration file to enable IP forwarding.

Which of the following commands can make non-permanent changes to exports?

exportfs

A proxy server collects web requests from computers on local networks and unconditionally forwards them directly to Web sites on the Internet.

false

NetCat (nc) is an Intrusion Detection System (IDS).

false

PAM configuration information is no longer stored in the /etc directory. Instead, it is stored as a group of files in the /usr/config directory.

false

The Linux command used to manage settings in the Linux firewall is fwconfig.

false

To use a Linux machine as a router, you must first turn on Network Address Translation (NAT).

false

Which of the following PAM control flags would result in the stack ceasing execution and failing if a module fails?

requisite

When configuring a Linux server to operate on a wireless network, you should ____.

scan for available local networks using the iwlist tool

Which of the following is considered to be the most popular open source mail server?

sendmail

Which PAM management group sets up a user's login session and cleans up when the user logs out?

session

You've downloaded the source code file, newprog-7.9.2.tar.gz, for a program you want to compile. How can you uncompress and extract it so that you can read the documentation and compile the program, assuming the file is named appropriately?

tar xvzf newprog-7.9.2.tar.gz

Which of the following utilities can you use to determine the currently-running kernel version number?

uname

What command might you have typed to have received the following output? Linux seeker 2.6.31-23-generic #74-Ubuntu SMP Mon Feb 28 22:20:11 UTC 2011~CAx86_64 GNU/Linux

uname -a

What is the name of the init process that is replacing the SysV startup system in some modern Linux distributions?

upstart

What option can you set in a Samba share definition to enable sam, jill, and harry to access the share, but nobody else?

valid users = sam, jill, harry


Conjuntos de estudio relacionados

Question (Answer with Yes or No) Send me a screenshot of your getting a 100% then go to BIG QUESTION quizlet

View Set

United States Government Branches (For Business Class)

View Set

Chapter 2: Network Infrastructure and Documentation

View Set

Most populated countries, part 1

View Set