Chapter 14 linux

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following commands will change the SELinux security context of a file?

chcon

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this

ifconfig eth0 Correct. The ifconfig command is a legacy command (modern systems are transitioning to using the ip command) that can be used to view or set an IP address on an ethernet interface.

Which of the following can you use to configure firewall rules for IPv6 on a Linux system?

ip6tables Correct. The ip6tables command can be used to configure firewall rules for IPv6 on a Linux system.

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password?

su

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?

sudo

Which of the following options for the gpg command will specify the key that should be retrieved?

--recv-keys

Which of the following options for the gpg command will attempt to use the gpg agent and if it cannot will ask for a passphrase?

--use-agent

Which of the following options for the iptables command will delete all rules for all chains?

-F

Which of the following files does a TCP wrapper check before starting a network daemon?

/etc/hosts.allow and /etc/hosts.deny Correct. The TCP wrapper should check the /etc/hosts.allow and /etc/hosts.deny files before starting a network daemon.

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination?

/etc/inittab Correct. On systems using SysV init, you can edit the /etc/inittab file to disable the ability to reboot a system by using the Ctrl+Alt+Delete key combination.

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login?

/etc/nologin.txt

Which of the following files contains the encrypted passwords for users on a modern Linux system by default

/etc/shadow

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?

/etc/sudoers Correct. The /etc/sudoers file contains the configuration for user privileges for the sudo command.

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.)

21 23

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server?

23/tcp open telnet

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do?

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

Which of the following does the -r option for the gpg command specify?

Encrypt for the user id given.

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory?

Kerberos Correct. Kerberos is used by Active Directory and the package should be installed on Linux in order to integrate certain authentication functions.

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented

OTP Correct. A token has a constantly changing code that can be used as a One-Time Password.

Which of the following are examples of multifactor authentication?

Password and fingerprint reader Correct. A password is something you know and a fingerprint reader is something you are. Those are two different factors of authentication; thus, it is an example of multifactor authentication.

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command?

RSA and RSA

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services?

TACACS+

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service?

TCP Wrapper

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration?

Users must use at least 3 characters as numbers in their passwords.

Which of the following is not a valid Apparmor command?

aa-trust

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?

brctl Correct. The brctl command can be used to view or modify the bridge configuration used by the Linux kernel for a network adapter.

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system?

dmidecode

Which of the following commands can be used to view the quota for a user?

edquota -u jsmith Correct. The edquota command will show you the current quota while in edit mode

Which of the following commands can you use to list users who have been locked out by pam_faillock.so?

faillock Correct. The faillock command will list users who have been locked out by pam_faillock.so.

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem?

fsck

Which of the following utilities can be used by a system administrator to determine which services are responding to network requests?

nmap

Which of the following permissions should a standard user have on the /etc/shadow file?

none of the above

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection?

ping Correct. The ping command can be used to determine the round trip time that a packet takes to traverse a network connection.

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance?

testwr

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?

tracepath Correct. The tracepath command traces a path to a network host, discovering the MTU along this path. mtrCorrect. The mtr command combines the functionality of the traceroute and ping commands and is also known as My Traceroute. traceroute

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface?

tshark Correct. The tshark command is the command line, or terminal, version of Wireshark.

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.)

udevadm control --reload udevadm control -R

Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command?

visudo


Kaugnay na mga set ng pag-aaral

Microbiology 250 - Chapter #4 Self Quiz

View Set

English 2327 The Legend of Sleepy Hollow

View Set

NCLEX Hurst Adult/Maternity/Psy/Priority/Child/Fundamental Questions

View Set

mod 4 data collection, behavior/ decisions

View Set

Med Surg Ch 47 Intestinal & Rectal Disorders

View Set

EVS lecture 6 (chapter 7: waste), lecture 7 (chapter 10: air pollution), & lecture 8 (chapter 11: ozone depletion)

View Set

CONCEPTOS RELACIONADOS CON LA SEXUALIDAD

View Set