Combo with "LabSim Linux+ 10.3" and 1 other

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which utility should you use to encrypt emails, digitally sign emails, and encrypt docs?

gpg

Which of the following configuration files holds the name of the host?

/etc/HOSTNAME

Which of the following files contain information that enables a Linux system to resolve IP addresses to FQDN/host names.

/etc/hosts /etc/resolv.conf

Which file should you edit to configure the inetd super daemon?

/etc/inetd.conf

Which file should you create to disable the ability to log into a Linux system?

/etc/nologin

Which file should you edit to determine the order in which name resolution is done?

/etc/nsswitch.conf

Which Pluggable Authentication Modules (PAM) config file should you edit to enforce login blocking?

/etc/pam.d/login

A number of remote users call to say that they cannot connect this morning via SSH. When you look at the processes, you see that the daemon us not running. Which command would you use to solve this problem?

/etc/rc.d/init.d/sshd start

Where does the client store SSH keys that are used for establishing an SSH session?

/etc/ssh/ssh_known hosts & ~/.ssh/known_hosts

Which file should you edit to configure the SSH daemon on the server system?

/etc/ssh/sshd_config

You need to configure which commands may be used with the sudo command. Which file should you edit?

/etc/sudoers

You have used su to become another user and fix problems with the user account. You now want to revert back to your regular account? Which command?

exit

Your site is dependent upon the use of the rlogin utility for remote access. For security reasons, you want to prevent the hosts in the marketing department from accessing the payroll server, but allow all others to do so. Which file should you use to create this restriction?

hosts.deny

Which keys are generated when you execute the ssh-keygen command with no options?

id_rsa & id_rsa.pub

Which command displays the IP address and subnet mask values configured on a workstation?

ifconfig

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?

DHCP

Which network service would you use to get the IP address from the FQDN hostname?

DNS

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?

DNS

You are currently logged in using the badams account. You want to view the contents of the /etc/inittab file, but you are not allowed to with the badams account. Which command could you use to view file?

su -c "cat /etc/inittab" -l

You have logged in as a regular user when a frantic phone call comes in. The ABCD process must be started on the server now, but can only be run by root. Which command would you use to start this process?

sudo ABCD

You need to increase the security of your Linux system by finding and closing open ports. Which of the following commands should you use to locate open ports?

nmap

Which command should you use to scan for open TCP ports on your Linux system?

nmap -sT

Which of the following utilities would you use to view the routing table?

route

You are limiting the total amount of mem a user can use when they use the X windows system. which of the following limit keywords should you use?

rss

You are modifying the tcpd control files of the xinetd super daemon. Of the two tcpd control files, which file is applied first?

/etc/hosts.deny

Which files should you edit to limit the amount of concurrent logins for a specific user?

/etc/security/limits.conf

Which super daemon is most commonly found in modern Linux distributions?

xinetd

Which of the following is an advantage of xinetd over inetd?

xinetd uses separate configuration files for each managed service

Which of the following pgp opts digitally sign docs?

--clearsign

Which chage option keeps a user from changing password every two weeks?

-m

Which of the following commands would not bring the first Ethernet interface down?

/etc/sysconfig/network-scripts/ifcfg-eth0 down

Management wants a compilation of specific data to occur every night. Which file must you edit to enable TFTP on the Linux Server?

/etc/xinetd.d/tftp

The gshant user is attempting to connect to a remote SSH server; however, you need to override the default SSH configurations for the client system when he establishes an SSH session. Which of the following files should you edit?

/home/gshant/.ssh/config

Which of the following commands can be used to retrieve the IP address and/or FQDN/host name infromation from a DNS server? (choose all that apply) 1) dig 2) netstat 3) host 4) nslookup

1) dig 3) host 4) nslookup

A user calls the helpdesk to report that she is unable to connect to the network after an upgrade of her Linux operating system. You suspect the problem is related to the network configuration. Which command would you use to quickly see the current IP address(es) assigned to her computer? 1) ifconfig -a 2) host 3) network -a 4) netstat -a

1) ifconfig -a

As you troubleshoot the network connection for your Linux system, you discover the eth1 interface is down. Which command should you use to start the interface? 1) ifup eth1 2) eth1 ifup 3) ifconfig eth1 4) eth1 ifconfig

1) ifup eth1

Which utility would you use to view current connections and active sessions and ports on a computer? 1) netstat 2) ping 3) nslookup 4) ipconfig

1) netstat

Which of the following commands could you use to view your local systems default gateway? (choose all that apply) 1) netstat -r 2) ifconfig -r 3) route 4) ifconfig

1) netstat -r 3) route

which of the following commands verifies the TCP/IP is working correctly on the local computer? 1) ping 127.0.0.1 2) ping -a localhost 3) netstat 4) nslookup localhost

1) ping 127.0.0.1

You are the administrator for a small network of Linux hosts. Your network does not communicate with the Internet and does not use DNS. When you add a new host named ENERGY7 to the network, which entry should be added to the /etc/hosts files?

192.168.0.34 ENERGY7 #Reception Area

You are attempting to ping another computer on the internet by its IP address but you are not getting a response. You do however get a response when pinging a host on your own network. Which of the following commands would help you better determine where the problem is? 1) Ping the computers FQDN (fully qualified domain name) 2) Run traceroute on the IP address of the computer on the internet. 3) Run netstat on the internet computer's IP adddress. 4) Run nslookup on the Internet computer's IP address.

2) Run traceroute on the IP address of the computer on the internet.

Which of the following network protocols must be used to connect to the internet? 1) IPX/SPX (NWLINK) 2) TCP/IP 3) AppleTalk 4) NETBeui/NETBios

2) TCP/IP

After arriving at work you turn on your Linux workstation and attempt to visit an internet news site. After a few minutes your Web browser times out telling you that the web site is unavailable. Which of the following troubleshooting steps would be helpful in determining the problem? (choose all that apply) 1) Use the ifconfig command to test if the IP address of the Web site you are trying to reach is correct. 2) Use the ping command to ping the FQDN and IP address of the website you are trying to reach. 3) Use the route command to test the route to the FQDN and IP address of the website you are trying to reach. 4) Use the traceroute command to traceroute the FQDN and IP address of the web site you are trying to reach.

2) Use the ping command to ping the FQDN and IP address of the website you are trying to reach. 4) Use the traceroute command to traceroute the FQDN and IP address of the web site you are trying to reach.

Which command displays network activity statistics for TCP, UDP and IP? 1) ping -s 2) netstat -s 3) nbtsat -s 4) telnet 5) nslookup

2) netstat -s

You are attempting to ping the FQDN of a computer on the internet, but are not getting a response. What is the problem? 1) Your default gateway is configured incorrectly. 2) pinging the FQDN of a computer does not give you enough information to know what the problem is. 3) Your NIC has failed. 4) Your local IP address information is configured incorrectly.

2) pinging the FQDN of a computer does not give you enough information to know what the problem is.

Which command could you use to see the path that a packet traveled across a network to a remote host? 1) ping 2) ifup 3) traceroute 4) route

3) traceroute

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network? 1) ifconfig 2) tracert 3) traceroute 4) ipconfig 5) nslookup 6) dig

3) traceroute

Which is the most correct description for 3DES?

3DES is a very secure mode of the DES algorithm encryption method that encrypts data three times using a 168-bit key.

You have just finished configuring a new network card in your Linux system. You would like to verify that it is configured to access the internet. Which of the following solutions would best help you verify that you have internet access? 1) run ifconfig 2) Attempt to ping the IP address of another computer on your network. 3) check to see if there is a link light on your network card. 4) Attempt to ping a site on the internet.

4) Attempt to ping a site on the internet.

You are trouble shooting a workstation that is having trouble while browsing the internet. You want to perform some tests on name resolution. which utility would give you the most information? 1) ping 2) traceroute 3) nslookup 4) dig

4) dig

Which of the following commands would allow you to see if a remote computer is reachable? 1) ipconfig 2) netstat 3) ifconfig 4) ping

4) ping

You want to allow any host from westsim.com to have access to your system. What is the correct line item you would add to the /etc/hosts.allow file to accomplish this?

ALL: .westsim.com

You want to allow any host from westsim.com to have access to your system except a system called testsvr.westsim.com What is the correct line item you would add to the /etc/hosts.allow file to accomplish this?

ALL: .westsim.com EXCEPT testsvr.westsim.com

What will the netstat -a command show?

All listening and non-listening sockets

What is the purpose of the find / type f -perm -o=x -ls

Audit file in the root dir that have execute perms for others

What is the purpose of the find /type f -perm -u=S -ls command?

Audit files in the root directory that have the SUID bit set

How would you enable the rsync service to be managed by the xinetd super daemon?

Create the rsync file in the /etc/xinetd.d

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gateway

You manage a Linux server that only occasionally and at random times needs to provide FTP services. To save on resources you want to only have the FTP server service running when it is needed and stopped the rest of the time. Which of the following solutions would satisfy these requirements and require the least amount of effort?

Enable the ftp service to be managed by the xinetd service.

You want to limit telnet access to three specific users How can you best accomplish this?

Enter IP address entries for the three users in the /etc/hosts.allow file

You are the system administrator of a test lab of computers running Linux. For security reasons your lab is not connected to the corporate network and therefore you are not able to resolve host names via the corporate DNS server. You do, however, want to be able to connect to the lab computers using host names, but you do not have the resources to bring up your own DNS server. Which of the following solutions would satisfy your requirements?

Enter the IP addresses and host names for all the lab computers in the /etc/hosts file on each of the machines in the lab.

Your ISP has changed the IP addresses of their DNS servers. What would you need to do on your Linux system to still be able to continue resolving host and fully qualified domain names if you use statically assigned IP address information?

Enter the IP addresses of the new DNS servers in the /etc/resolv.conf file.

What effect does the ulimit -t 600 command have on a linux system?

Limits CPU time for a process to 10mins

Within the /etc/security/limits.conf file, you notice the following entry: @guests hard maxlogins 3

Limits the number of max logins from the guest group to three

You are the only Linux administrator for a very small company. You are constantly asked to fix one problem or another as they occur. How should you log in to the system each morning?

Login as a regular user, then use su a needed to solve problems.

You believe your GnuPG key pair has been comprimised and should no longer be used. What are two steps you must take to revoke a pub key onn a key server?

Rovoke the key on a system using the key revocation cert & Send the rovoked key....

Which version of SSH supports both the Rivest, Shamir Adleman (RSA_ and Digital Sig Algorithm (DSA) encryption standards?

SSH2

What is the effect of the following command? chage -M 60 -W 10 jsmith

Sets the password for jsmith to expire after 60 days and gives 1a warning 10 days before it expires

You open the /etc/nsswitch.conf file and observe the following line: hosts: files dns What is the result of this configuration?

The /etc/hosts file takes precedence over information obtained from a DNS server when resolving domain names.

You are asked to troubleshoot a problem on a user's computer. When the user types the name of any Web site, he gets a message "The page cannot be displayed". You determine that nothing has changed on the computer. What is the likely problem?

The DNS server is down or not reachable.

What would be the result of the following command? host www.somedom.com

The IP address and A record name of the computer www.somedom.com would be displayed.

Observe the following command: ssh -f -N -L 2345:mail.mydomain.com:110 [email protected],com

To ensure that SSH does not execute a remote command

What is the main purpose of the xinetd service?

To listen on behalf of different network services and to start and stop them on demand

Which parameter of the /etc/inetd.conf file determines the user permissions when network daemons access the file system?

User

What chage command should you use to set the password for jsmith to expire after 60 days and gives a warning 10 days before it expires?

chage -M 60 -W 10 jsmith

You believe your GnuPG key pair has been compromised and should no longer be used. What command should you use to create a key revocation cert for the key pair?

gpg --gen-revoke

Which command should you use to find the IP address for the xyzcomp.com domain?

host xyzcomp.com

Which command would you use to configure the IP address of 192.168.0.123 for the first Ethernet car in a host?

ifconfig eth0 192.168.0.123

You need to temporarily change the IP address of your first Ethernet interface (eth0) to 192.168.1.50 where it is currently set to 10.0.1.50. Which command would achieve the desired result?

ifconfig eth0 192.168.1.50

You need to set the IP address for eth1 to 192.168.15.2 with a subnet mask of 255.255.255.0. Which command is correct?

ifconfig eth1 192.168.15.2 netmask 255.255.255.0

The Eth1 interface is currently down. Which command will start the Eth1 interface?

ifup eth1

Which command should you use too display both listening and non-listening sockets on your Linux system?

netstat -a

You need to allow Peter and Paul access to execute any programs in the /bin or /sbin directories without needing to su to root. Which command line added to the sudoers file will work?

peter, paul ALL = /sbin/, /usr/bin

You want to change the port that SSH listens on. You are going to edit the /etc/ssh/sshd_config file. Which line, when added to the file, will change the listening port to 1066?

port 1066

After an acquisition of another company, you are in a position where you must add another network to the existing routing tables. Which of the following commands would you use to accomplish this?

route add -net 11.12.13.14/24 gw 201.12.3.4

As a system administrator you need to add a static route so that you can reach host 195.156.76.122 255.255.255.0. Which command will work?

route add -net 195.156.76.0 netmask 255.255.255.0 dev eth0

As a system admin you are going to add a static for host 195.157.66.221 255.255.255.0. Your default gateway is 192.168.5.1 but you want this route to use gateway 192.168.7.1. Which command will work?

route add -net 195.157.66.0 netmask 255.255.255.0 gw 192.168.7.1

As a system administrator you want to block (reject) any packets from 170.122.0.0 255.255.0.0. Which command will block those packets?

route add 170.122.0.0 netmask 255.255.0.0 reject

You have replaced the default gateway on your network. The gateway had used the IP address of 201.12.3.4 and you must remove it from the routing table. Which command would you use to accomplish this?

route del default gw 201.12.3.4

Which ssh option should you use to set up

ssh -X

You need to connect to a remote system whose host name is abc.def.com and execute a shell script called daily-backup.sh that backs... Which command should you run to make the connection?

ssh -l bubba abc.def.com

As you configure your client for public key authentication, you decide to generate the DSA key pair.

ssh-add ~/.ssh/id_dsa

When configuring public key authentication on your client system, which command enables the passphrase agent?

ssh-agent bash

When using DSA to establish an SSH session, what is the name of the key that the SSH server will send to the client?

ssh_host_dsa_key.pub

Which of the following public keys is sent from the SSH server to the SSH client when they are in the process of est...

ssh_host_key.pub

Which command should you use to check the TCP wrapper configuration on your system?

tcpdchk

Which utility is similar to traceroute but does not require elevated priviledges? (enter the command as if at the command prompt)

tracepath

Which command will prevent the shell from using too much of the system's resources?

ulimit

Which command should you use to edit the /etc/sudoers file?

visudo

You need to block all users from logging in to the Linux system while you resolve a serious issue. You first need to force all active users to logout. Which command will display a list of all active users?

w


Ensembles d'études connexes

TestOut Linux Pro practice questions

View Set

Great Gatsby Quote Identification

View Set

AP Psych - Unit 4 Test Review (AP Classroom Questions)

View Set