Module 14 Review Quiz: Linux installation and configuration
Which of the following steps is not a common troubleshooting procedure? Test the solution. Isolate the problem. Delegate responsibility. Collect information.
Delegate responsibility.
Which command can increase the number of filehandles that programs can open in a shell? ldd ulimit lba32 top
ulimit
Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time? 15 sa39 sa19 00
sa19
Which file contains information regarding the users, computers, and commands used by the sudo command? /etc/sudo /etc/su.cfg /etc/sudo.cfg /etc/sudoers
/etc/sudoers
On which part of the maintenance cycle do Linux administrators spend the most time? monitoring proactive maintenance reactive maintenance documentation
monitoring
Which of the following commands can be used to scan the available ports on computers within your organization? traceroute tracert nmap sudo
nmap
Which of the following UFW commands can be used to view configured firewall rules? ufw ufw status ufw show ufwdisplay
ufw status
The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?
False
When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?
False
What type of iptables chain targets traffic that is destined for the local computer? INPUT ROUTE FORWARD OUTPUT
INPUT
What are best practices for securing a Linux server? (Choose all that apply.) Lock the server in a server closet. Ensure that you are logged in as the root user to the server at all times. Ensure that SELinux or AppArmor is used to protect key services. Use encryption for files and network traffic.
Lock the server in a server closet Ensure that SELinux or AppArmor is used to protect key services Use encryption for files and network traffic
Which option can be added to the ls or ps command to view the SELinux label? -s -S -L -Z
Z
When performing a sar -u command, you notice that %idle is consistently 10 percent. Is this good or bad? Good, because the processor should be idle more than 5 percent of the time Good, because the processor is idle 90 percent of the time Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required Bad, because the processor is idle 10 percent of the time and perhaps a new hard disk is required
Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?
False
Which of the following actions should you first take to secure your Linux computer against network attacks? Change permissions on key system files. Ensure that only necessary services are running. Run a checksum for each file used by network services. Configure entries in the /etc/sudoers file.
Ensure that only necessary services are running
Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.) SSL/TLS LUKS GPG L2TP
LUKS GPG
What will the command sar -W 3 50 do? Take 3 swap statistics every 50 seconds. Take 50 swap statistics every 3 seconds. Take 3 CPU statistics every 50 seconds. Take 50 CPU statistics every 3 seconds.
Take 50 swap statistics every 3 seconds
To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?
True
Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? firewall-cmd --add-service ssh firewall-cmd --add-port 22/tcp firewall-cmd --add-port 22/udp firewall-cmd --add-service ssh --permanent
firewall-cmd --add-service ssh --permanent
Which of the following commands can be used to display memory statistics? (Choose all that apply.) free sar vmstat iostat
free sar vmstat