Linux - Chapter 14 Review
Which file contains information regarding the users, computers, and commands used by the sudo command?
/etc/sudoers
Which the following linux intrusion detection systems can be used to detect altered files and directories?
AIDE tripwire
Which of the following steps is not a common troubleshooting procedure?
Delegate responsibility
Which of the following actions should you first take to secure your linux computer against network attacks?
Ensure that only necessary services are running
The lspci can be used to isolate problems with X Windows. True or False?
False
When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup.
False
What type of netfilter/iptables chain targets traffic that is destined for the local computer?
Input
What are the best practices for securing a local limit server?
Lock the server in a server closet set a BIOS password on the server
Which of the following are common assistive technologies?
Mouse Keys Sticky Keys On-Screen Keyboard
What will the command sar -W3 50 do?
Take 3 swap statistics every 50 seconds
RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?
True
The private key is used when creating a digital signature. True or False?
True
When performing a sar -u command, you notice that %idle is consistently 10%; is this good or bad?
bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
Which of the following commands can be used to display memory statistics?
free sar vmstat
Which command indicates the shared libraries required by a certain executable program?
ldd
On which part of the maintenance cycle do Linux administrators spend the most time?
monitoring
Which of the following commands can be used to scan the available ports on computers within your organization?
nmap
Which of the following files is likely to be found in the /var/log/sa directory over time?
sa19
Which command can increase the number of files handles that programs can open in a shell?
ulimit