Linux - Chapter 14 Review Quiz
True
12. The private key is used when creating a digital signature. a. True b. False
False
18. When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. ? a. True b. False
Delegate responsibility.
8. Which of the following steps is not a common troubleshooting procedure? a. Test the solution. b. Isolate the problem. c. Delegate responsibility. d. Collect information.
PortSentry Snort
Which of the following Linux intrusion detection systems can be used to detect port scans? a. AIDE b. PortSentry c. tripwire d. Snort
firewall cmd - -add-service s sh - -permanent
9. Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall —cmd — -add-service s sh b. firewall -cmd -add-port 22/tcp c. firewall -cmd - -add-port 22 /udp d. firewall cmd - -add-service s sh - -permanent
Ensure that only necessary services are running.
13. Which of the following actions should you first take to secure your Linux computer against network attacks? a. Change permissions on key system files. b. Ensure that only necessary services are running. c. Run a checksum for each file used by network services. d. Configure entries in the /etc/sudoers file.
Take 3 swap statistics every 50
14. What will the command sar —W 3 50 do ? a. Take 3 swap statistics every 50 seconds. b. Take 50 swap statistics every 3 seconds. c. Take 3 CPU statistics every 50 seconds. d. Take 50 CPU statistics every 3 seconds.
nmap
15. Which of the following commands can be used to scan the available ports on computers within your organization? a. traceroute b. tracert c. nmap d. sudo
mouse keys high contrast sticky keys on-screen keyboard
16. Which of the following are common assistive technologies? (Choose all that apply.) a. mouse keys b. high contrast c. sticky keys d. on-screen keyboard
AIDE tripwire
17. Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.) a. AIDE b. SWATCH c. tripwire d. Snort
check syslog, dmesg, fstab and fdisk /dev/sda6
What would you use to collect information when troubleshooting if the system was unable to mount the /home filesystem (/dev/sda6)?
/etc/sudoers
10. Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/su.cfg c. /etc/sudo.cfg d. /etc/sudoers
sa19
2. Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. 15 b. sa39 c. sa19 d. 00
True
6. RSA is a common symmetric encryption algorithm used by SSH and GPG. ? a. True b. False
bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
19. When performing a sar —u command, you notice that %idle is consistently 10 percent. Is this good or bad? a. good, because the processor should be idle more than 5 percent of the time b. good, because the processor is idle 90 percent of the time c. bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required d. bad, because the processor is idle 10 percent of the time and perhaps a new hard disk is required
/etc/resolv.conf
Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? a. /etc/hosts b. /etc/host.conf c. /etc/resolve d. /etc/resolv.conf
AIDE tripwire
Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.) a. AIDE b. SWATCH c. tripwire d. Snort
Run rpm -V [software name] to check for missing files and check the missing shared libraries using the ldd software name
What would you use to collect information when troubleshooting a new database application the fails to start successfully?
Check the sound card driver using the lspci command and reinstall the drivers
What would you use to collect information when troubleshooting a new sound card in the Linux system, but is not listed within any sound utility?
Free Vmstat sar
4. Which of the following commands can be used to display memory statistics? (Choose all that apply.) a. Free b. sar c. vmstat d. iostat
ldd
5. Which command indicates the shared libraries required by a certain executable program? a. Idconfig b. ldd c. rpm —V d. s 1 conf i g
monitoring
1. On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. proactive maintenance c. reactive maintenance d. documentation
True
SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?
View output of dmesg command for missing driver and view contents of the /var/log/messages
What would you use to collect information when troubleshooting a CD-ROM device that worked previously with Linux but now does not respond to the mount command?
Check the network configuration tool, located in /etc/network/interface
What would you use to collect information when troubleshooting a network configuration utility that you installed but will not recognize any modems on the system?
ulimit
11. Which command can increase the number of file handles that programs can open in a shell? a. Idd b. ulimit c. Iba3 2 d. t
a. Lock the server in a server closet. c. Ensure that SELinux or AppArmor is used to protect key services.
20. What are best practices for securing a Linux server? (Choose all that apply.) a. Lock the server in a server closet. b. Ensure that you are logged in as the root user to the server at all times. c. Ensure that SELinux or AppArmor is used to protect key services. d. Set the default run level to 1 (Single User Mode).
False
3. The Ispci command can be used to isolate problems with X Windows. ? a. True b. False
INPUT
7. What type of iptables chain targets traffic that is destined for the local computer? a. INPUT b. ROUTE c. FORWARD d. OUTPUT