CompTIA Linux+ Chapter 14

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running.

RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?

False

The lspci command can be used to isolate problems with X Windows. True or False?

False

When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?

False

Which of the following are common assistive technologies? (Choose all that apply.)

High contrast Mouse keys On-screen keyboard Sticky keys

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

What are best practices for securing a local Linux server? (Choose all that apply.)

Lock the server in a server closet. Ensure that SELinux or AppArmor is used to protect key services.

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds.

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

bad, because the processor is idle 10% of the time and perhaps a faster CPU is required

Which command indicates the shared libraries required by a certain executable program?

ldd

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time?

sa19

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

Which of the following commands can be used to display memory statistics? (Choose all that apply.)

vmstat sar free


संबंधित स्टडी सेट्स

Accounting Chapter 4 Concept Review

View Set

Entrepreneurship and new venture management

View Set

Part 8: Opioid-Associated Life-Threatening Emergencies

View Set

Computer Networks-Chapter 7 Review Questions

View Set

Chapter 13: ICMP Chapter questions and end chapter QUIZ

View Set

Precalculus Sine, Cosine, Tangent Wheel

View Set

Personal Finance Chapter 8 Assessment

View Set