NOS 120 Study Guide Ch. 14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented? Select one: a. CUPS b. Kerberos c. OTP d. Finger

OTP

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? Select one: a. brstat b. ip bridge c. netbr d. brctl

brctl

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system? Select one: a. lsuefi b. dmidecode c. biosinfo d. hwls

dmidecode

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? Select one: a. chkfs b. blocks c. chkdisk d. fsck

fsck

Which of the following can you use to configure firewall rules for IPv6 on a Linux system? Select one: a. fw --ipv6 b. ip6tables c. netfilter -6 d. fw6

ip6tables

Which of the following permissions should a standard user have on the /etc/shadow file? Select one: a. read b. read, write, and execute c. read and write d. none of the above

none of the above

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? Select one: a. ethstat b. ping c. finger d. transit

ping

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? Select one: a. su b. sudo c. doas d. sudoer

sudo

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? Select one: a. noop b. cfq c. deadline d. testwr

testwr

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? Select one or more: a. mtr b. tracert c. traceroute d. tracepath

tracepath traceroute mtr

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? Select one: a. wshark b. nshark c. ushark d. tshark

tshark

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) Select one or more: a. udevadm --reload b. udevadm control --reload c. udevadm control -R d. udevadm control -r

udevadm control -R udevadm control --reload

Which of the following options for the gpg command will specify the key that should be retrieved? Select one: a. --request b. --recv-keys c. --get-key d. --get

--recv-keys

Which of the following options for the iptables command will delete all rules for all chains? Select one: a. -R b. -D c. -F d. -C

-F

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? Select one: a. /etc/cmd.conf b. /etc/init.conf c. /etc/keys.conf d. /etc/inittab

/etc/inittab

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? Select one: a. /etc/banner.conf b. /etc/nologin.txt c. /etc/deny.login d. /etc/warning.txt

/etc/nologin.txt

Which of the following files contains the encrypted passwords for users on a modern Linux system by default? Select one: a. /etc/passwd b. /etc/shadow c. /etc/psh d. /etc/pwenc

/etc/shadow

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? Select one: a. /etc/sudoers b. /etc/rc.d/sudoers.conf c. /etc/sudo.conf d. /etc/su.conf

/etc/sudoers

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? Select one: a. Configure /etc/fstab to mount the partition. b. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it. c. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. d. Configure /etc/crypttab to mount the partition.

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? Select one: a. public b. DMZ c. trusted d. internal

DMZ

Which of the following does the -r option for the gpg command specify? Select one: a. Encrypt for the user id given. b. Remote key server to query. c. Retrieve keys for given key ID. d. Revoke keys from the key server.

Encrypt for the user id given.

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? Select one: a. Syslog b. Kerberos c. TFTP d. Telnet

Kerberos

Which of the following are examples of multifactor authentication? Select one: a. Password and PIN b. Password and fingerprint reader c. Thumbprint reader and facial recognition d. A USB token and a Common Access Card

Password and fingerprint reader

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? Select one: a. ufw b. netfilter c. iptables d. TCP Wrapper

TCP Wrapper

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration? Select one: a. There must be at least 3 characters that are different from their previous password. b. Users cannot re-use their last 3 passwords. c. The minimum password length has to be at least 3 characters long. d. Users must use at least 3 characters as numbers in their passwords.

Users must use at least 3 characters as numbers in their passwords.


Ensembles d'études connexes

MyProgrammingLab Chapter 7.2-7.4

View Set

LCSW_ Assessment, Diagnosis, and Treatment Planning

View Set

2.3 Financial Markets Instruments

View Set

Chapter 8 Lecture Culturelle (v/f + answer the question)

View Set