LX0-102

¡Supera tus tareas y exámenes ahora con Quizwiz!

You login server is using PAM, and you want to limit users' access to system resources. Which configuration file will you need to edit?

/etc/security/limits.conf

Which of the following lines identify valid shell scripts on a normally configured system?

#! /bin/bash #! /bin/sh

which of the following configuration files does the logrotate program consult for its settings?

/etc/logrotate.conf

What network port would an IMAP set never use for IMAP exchanges

143

Which of the following lines, if used in a user cron job, will run /usr/local/bin/cleanup twice a day

15 7,19*** /usr/local/bin/cleanup

Which of the following is a valid IPv4 address for a single computer on a TCP/IP network

63.63.63.63

what information about print jobs does the lpq command display

A numerical job ID that can be used to manipulate the Job and The username of the person who submitted the job.

What types of files might you expect to find in /etc/skel

An empty set of directories to encourage good file management practices. A README or similar welcome file for new users. A starting .bashrc file.

Your SMTP email server, mail.luna.edu, receives a message addressed to postmaster@ mail.luna.edu there is no postmaster account on this computer. Assuming the system is properly configured, how should the email server respond

Deliver the email to another account, either locally or on another computer.

You/ve discovered that the waiter program (a network server) is running inappropriately on your computer. You therefore locate its SysV startup script and shut it down by removing the script from you default runleve. How can you further reduce the risk that the Waiter program will be abused by outsiders?

By blocking the Waiter program's port using a firewall rule and/or by uninstalling the Waiter package.

What file might a suer modify to alter his or her own bash environment

~/.barshrc

You manage a computer that's located in Los Angeles, California, but the time zone is misconfigured as being in Tokyo, Japan. What procedure can you follow to fix this problem

Delete /etc/localtime, and replace it with an appropriate file from /usr/share/zoneinfo. or Use the tzselect program to select a new (Los Angeles) time zone.

How can you reconfigure Linux to use DNS queries prior to consulting /etc/hosts

Edit /etc/nsswitch.conf, and change the oder of the files and dns options on the hosts: line

How would you change the text displayed by XDP as a greeting

Edit the /etc/X11/xdm/Xresources file, and change the text in the xlogin*greeting line.

Your internet connection has gone down for several hours. What is true of email sent by our users to off-site recipients via properly configure local SMTP server?

Email will be delayed by a few hours but not lost.

You've developed a script that uses several Linux commands and edits their output. You want to be sure that the script runs correctly on a computer in Great Britain, although you're located elsewhere, since the output includes features such as currency symbols and decimal numbers that are different from one nation to another. What might you do to test this?

Type export LC ALL=en_GB.UTF-8, and run the script from the same shell you used to type this command.

You've downloaded a GPG public key from a Web site, into the file fredkey.pub. What mush you do with this key to use it?

Type gpg --import fredkey.pub

Which of the following is not a popular SMTP server for Linux?

Fetchmail

To assist an employee who has trouble with keyboard repeat features, you've disabled this function in /etc/X11/xorg.conf. Why might this step not be sufficient to the goal of disabling keyboard repeat?

GNOME, KDE, or other desktop environment settings for keyboard repeat may override those set in xorg.conf

In what section of XF86Config or xorg.conf do you specify the resolution that you want to run?

In the Screen section, subsection Display, using the Modes option

What is an advantage of a font server

It can simplify font maintenance on a network with many X servers.

What is the purpose of the -n option to route?

It causes machines to be identified by ip address rather than hostname in output.

Describe the effect of the following short script, cpm, if its called as cpl big.c big.cc: #! /bin/bash cp $2 $1

It copies the contents of big.cc.to big.c, eliminating the old big.c

Which of the following describes the function of a smart filter.

It detects the type of a file and passes it through programs to make it printable on a given model of printer.

what is the purpose of /etc/hostname, if its present on the system?

It holds the computer's default hostname.

what is the purpose of /etc/reslov.conf

It sets the computer's default search domain and identifies (by IP address) the name servers that the computer may use.

What is the effect of the following SQL command, as suing the various names and data exist? mysql> UPDATE stars SET magnitude=2.25 WHERE starname='Mintaka';

It sets the value of the magnitude field to 2.25 for any item in the stars table with the star name Mintaka

Which of the following entries are found in the /etc/hosts file

Mappings of IP addresses to hostnames.

The /etc/sudoers file on a computer includes the following line, what is the effect? %admin ALL=(ALL) ALL

Members of the admin group may run all programs with root privileges by using sudo.

Which of the following are true statements about SQL tables?

Multiple tables may exist in a single SQL database and Careful table design can reduce the amour of data entry and database storage size

Where is the best location for the current directory indicator(.) to reside in root's PATH environment variable?

Nowhere; it shouldn't be in the root's path

as a part of a security audit, you plan to use mmap to check all the computer on your network for unnecessary servers. Which of the following tasks should you do prior to running your Nmap check?

Obtain written permission from your boss to perform the Nmap sweep

Which of the rolling programs may be used to provide computer-generate speech for users who have trouble reading computer displays.

Orca Emacspeak

In what environment variable is the current working directory stored?

PWD

Which of the following types of attacks involves sending bogus email to lure unsuspecting individuals into divulging sensitive financial or other information?

Phishing

How might you schedule a script to run once a day on a Linux computer

Place the script, or a link to it, in /etc/cron.daily or Create a user cron job that calls the specified script once a day at a time of your choosing, and install that cron job using crontab.

for best SSH server security, how should you set the protocol option in /etc/ssh/sshd_config?

Protocol 2

Using a packet sniffer, you notice a lot of traffic directed at TCP port 22 on a local computer. What protocol does this traffic use, assuming its a stander port

SSH

When you configure an X server, you need to make changes to configuration files and then start or restart the X server. Which of the following can help streamline this process?

Shut down X by switching to a runlevel in which X doesn't run automatically, and then reconfigure it and use startx to test X startup

Why is it unwise to allow root to log on directly using SSH

Somebody with the root password but no other password can then break into the computer.

What methods do Linux distributions use to start X automatically when the system boots.

Start an XDMCP server via a system startup script. OR Start an XDMCP server from init.

You've submitted several print jobs, but you've just realized that you mistakenly submitted a huge document that you didn't want to print. Assuming you can identify which job this was, that it's not yet printing, and that its job ID number is 749, what command would you type to delete if from the okidata print queue?

Type lprm -Pokidata 749

What do the following commands accomplish? (the administrator presses Ctrl+D after typing the second command.) # at teatime at> /usr/local/bin/system-maintenance

The /usr/local/bin/system-maintenance program or script is run at 4:00pm

which of the following types of information are returned by typing ifconfig eth0

The IP address assigned to eth0 and The hardware address of eth0

Which of the following features do KDM and GDM provide that XDM doesn't?

The ability to select the login environment from a menu on the main login scree.

Which of the following summarizes the organization of the X configuration file?

The file is broken into sections, one or more for each component (keyboard, video card, and so on). The file also has one or more sections that define how to combine the main sections.

which of the following programs is conventionally used to preform a DNS lookup

The host program

What will be the effect of a computer having the following two lines in /etc/ntp.conf server pool.ntp.org server tardis.example.org

The local computer's NTP server will poll both a server in the public NTP server pool and tardis.example.org and use whichever site provides the cleanest time data.

A monitor's manual lists its range of acceptable synchronization values as 27-96kHz horizontal and 50-160Hz vertical. What implications does this have for the resolutions and refresh rates the monitor can handle?

The monitor can handle up to 160Hz vertical refresh rate depending on the resolution.

You're configuring a new system, and your network administrator scribbles its IP address (172.25.78.89), netmask (255.255.255.0) gateway address (172.25.79.1), and DNS server address (10.24.89.201) on a piece of paper. You enter this information into your configuration files and type ifup eth0, but you find that you can't access the internet with this computer. Which of the following is definitely true?

The netmask identifies the gateway as being on a different network segment than the computer you're configuring, so the two can't communicate directly. You most likely misread one of the address.

Ordinary users report being unable to log onto a computer, but root has bo problems doing so. what might you check for to expelling this situation

The presence of an /etc/nologin file.

As root, you type date 12110710. What will be the effect?

The software clock will be set to 7:10 a.m. December 11 of the current year.

An administrator types chage -M 7 time. What is the effect of this command.

The time account's password must be changed at least once every seven days.

What is wrong with the following /etc/passwd file entry? 4sally:x:1029:Sally Jones:/home/myhome:/bin/passwd

The username is invalid; Linux users names can't begin with a number. and Either the UID or the GID field is missing

Why are groups important to the Linux user administration and security models.

They can be used to provide a set of users with access to files without giving all users access to the files.

What is the purpose of conditional expressions in shell scripts?

They enable the script to take different actions in response to variable data.

which of the following is generally true of Linux programs that print

They produce PostScript output for printing

Which types of network hardware does Linux Support?

Token Ring, Ethernet and Fibre Channle

You're just installed MySQL and run it by typing mysql. How would you create a database called fish to store data on different varieties of fish?

Type REATE DATABASE fish; at the mysql> prompt.

You're configuring a Linux system that doesn't boot from any other OS. What is recommended time to which the computer's hardware clock should be set.

UTC

Which character set encoding is the preferred method on modern linux systems?

UTF-8

You find that the ssh_host_dsa_key file in /etc/ssh has 0666 permissions. Your SSH server has been in operation for several months. should you be concerned?

Yes

You want to send an encrypted message to an email correspondent. You both have GPG. what do you need to exchange before you can send your encrypted message.

You must obtain your correspondent's GPG public key.

You what to set up a computer on a local network via static TCP/IP configuration, but you lack a gateway address. Which of the following is true

You'll be able to communicate with machines on your local network segment but not with other systems.

The ping utility responds normally when you use it with an IP address but not when you use it with a hostname that you're positive corresponds to this IP address. What might cause this problem.

Your computer's DNS configuration may be broken. or The route between your computer and its DNS server may be incorrect.

To diagnose a problem with an IMAP server (imap.example.com), you type telnet imap.example.com 143 from a remote client. How can this procedure help you?

ad You can verify basic connectivity between the client computer and the server program. or once connected, you can type IMAP commands to test the server's response to them

You want to create a shortcut for the command cd ~/papers/trade. Which of the following lines, if entered in a bash startup script, will accomplish this goal.

alias cdpt='cd ~/papers/trade'

You se the following line in a script: mail -s "Error" -c abort </tmp/msg root

an email with the subject of Error and the contents from /tmp/msg is sent to the local users root and abort.

You're installing Linux on a laptop computer. Which of the following programs might you want to add to ensure that log rotation is handled correctly?

anacron

Your manager has asked that you configure logrotate to run on regular, unattended basis. What utility feature should you configure to make this possible

cron

which of the following commands might bring up an interface on eth1

dhclient eth1 and ifup eth1

Which of the following are not Linux DCHP clients

dhcpd and ifconfig

You examine your /etc/aliases file and fine it contains the following line root: jody what can you conclude from this?

email addressed to root on this system will be sent to the local user jody.

Which of the following system logging codes represents the highest priority?

emerg

You want to use xinetd access controls to limit who may access a server that's launched via xinitd. specifically, only users on the 192.168.7.0/24 network block should be able to use that server. how may you do this?

enter only_from = 192.168.7.0/24 in the /etc/xinetd.d configuration file for the server in question

What commands might you use (along with appropriate options) to learn the value of a specific environment variable?

env, and echo.

Which of the following commands if typed in a bash shell, will create an environment variable called MYVAR with the contents my stuff that will be accessible to subsequently launched programs?

export MYVAR='mystuff'

which of the following commands will locate all program files on a computer which the SUID bit is set

find / -perm +4000 -type f

Which of the following tasks are most likely to be handled by a cron job.

finding and deleting old temporary files monitoring the status of servers and e-mailing a report to the superusers.

Which of the following are valid looping statements in bash shell scripting

for while until

A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs

host.allow takes precedence; the client is grated access to the server.

You've set your system (software) clock on a Linux-only computer to the correct time, and now you want to set the hardware clock to match. What command might you type to accomplish this goal?

hwclock --utc --systohc

of the following, which is the best password

iA710ci^My~~~~~~

Which of the following is a legal Linux username that will be accepted by useradd

larrythemoose

You want to create a log file entry nothing that you're manually shutting down the system to a a new network card. how might you create this log entry, just prior to using shutdown?

logger shutting down to add network card.

You want sally, tom, and dale to be members of the group managers (GID 501) How would you edit the managers entry in /etc/group to accomplish this goal?

managers:x:501:dale, sally, tom

What tool might you use to print a four-page PostScript file on a single sheet of paper?

mpage

Which command would you type, as root to discover all the open network connections on a line computer?

netstat -ap

How can you learn what programs are currently accessing the network on a Linux system

netstat -p

Which of the rolling tools might you use to check for open ports on a local computer?

nmap, netstat and lsof

Typing lsof -i | grep LISTEN AS root produces three lines of output, corresponding to the sendmail, sshd and prftpd servers. what can you conclude about the security of this system

no conclusion can be draw without further information; the listed server may or may not be appropriate or authentic.

You've configured one compter (gateway.pangaea.edu) om your five-computer network as an NTP server that obtains its time signal from ntp.example.com What computer(s) should your network's other computer use as their time source(s)

only gateway.pangaea.edu

when is the bind option of xinitd most useful?

when xinitd is running on the system with two network interfaces.

Which of the rolling commands tells the X server to accept connections from penguin.example.com

xhost +penguin.example.com

which of the following commands should you type to add to host 192.168.0.10 a default gateway to 192.16.8.0.1

route add default gw 192.168.0.1

After using a text editor to create a shell script, what step should you take before trying to use the script

set one or more executable bit using chmod

What is the purpose of the EDITOR environment variable?

some programs refer to EDITOR to determine what external editor to launch when they need to launch one.

Which servers might you consider retiring ager activating an SSH server

telnet and ftp

Network accesses to parts of the internet work fine, but several common sites have stopped responding (even when addressed via raw IP addresses). Which of the following tools will be most helpful in diagnosing the source of the problem

traceroute

What would a Linux system administrator type to remove the memo account and its home directory?

userdel -r nemo


Conjuntos de estudio relacionados

ENT4013 Ch 16 & 17 Plan New Ventures

View Set

Chapter 25 Thermo-regulation-homestasis, Big Bio Exam

View Set

Government Funding for STEM Programs

View Set

0Marketing Quiz Book Questions (Ch 1)

View Set

Nutrition 191 Chapter 9-14 Review

View Set

Unit 2 WA ATAR P&L: Electoral Systems In Australia

View Set

Chapter 29 - Listening Guide Quiz 19: Haydn: String Quartet in E-flat Major, Op. 33, No. 2 (Joke), IV

View Set