Module 14 Review Quiz: Linux installation and configuration

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?

False

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

Which of the following commands can be used to display memory statistics? (Choose all that apply.)

free sar vmstat

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

Which of the following UFW commands can be used to view configured firewall rules?

ufw status

To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

True

When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

False

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility.

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running

Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

False

Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)

LUKS GPG

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds

What are best practices for securing a local Linux server? (Choose all that apply.)

Lock the server in a server closet Ensure that SELinux or AppArmor is used to protect key services Use encryption for files and network traffic

Which option can be added to the ls or ps command to view the SELinux label?

Z

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?

sa19

Which command can increase the number of filehandles that programs can open in a shell?

ulimit


Conjuntos de estudio relacionados

english study questions (of mice of men)

View Set

Chapter 9 - Teaching and Counseling

View Set

ADM 303 Fundamentals of Management Chapters 7 & 8 Study Quiz

View Set

Analyzing the French and Haitian Revolution

View Set