15.5.4 - The xinetd Super Daemon (Practice Question)
/etc/xinetd./tftp
Management wants a compilation of specific data to occur every night. The only way to accomplish this task is to copy files throughout all network hosts to one server via TFTP. Which of the following files MUST be edited to enable xinetd to manage TFTP on Linux server?
tcpdchk
What should you enter at the command prompt to check the TCP wrapper configuration on your system?
xinetd uses separate configuration files for each managed service.
Which of the following is an advantage of xinetd over inetd?
To receive client requests for network for network services and start and stop them on demand.
Which of the following is the main purpose of the xinetd service?
xinetd
Which of the following is the super daemon that is most commonly found in modern Linux distributions?
Create the rsync file in /etc/xinetd.d
Which of the following would enable the rsync service to be managed by the xinetd super daemon?
/etc/hosts.allow
You are modifying the tcpd control files of the xinetd super daemon. Of the two tcpd control files, what is the full path and filename of the file that is applies first?
Enable the ftp service to be managed by the xinetd service.
You manage a Linux server that occasionally needs to provide ftp services at irregular intervals. To save on resources, you want to have the ftp server service running only when it is needed, and stopped the rest of the time. Which of the following solutions would satisfy these requirements and require the LEAST amount of effort?
ALL: .westsim.com EXCEPT testsvr.westsim.com
You want to allow any host from westsim.com to have access to your system except a system called testsvr.westsim.com Which of the following line items would you add to the /etc/hosts.allow file to accomplish this task?
ALL: .wesim.com
You want to allow any host from westsim.com to have access to your system. Which of the following line items would you add to the /etc/hosts.allow file to accomplish this task?
Enter IP address entries for the three users in the /etc/hosts.allowfile.
You want to limit Telnet access to three specific users. Which of the following strategies will BEST accomplish this goal?
hosts.deny
Your site is dependent upon the use of the rlogin utility for remote access. For security reasons, you want to prevent the hosts in the marketing department from accessing the payroll server, but allow all others to do so. Which of the following files should you use to create this restriction?