Module 14 Review Quiz: Linux installation and configuration
What type of iptables chain targets traffic that is destined for the local computer?
INPUT
The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?
False
Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?
firewall-cmd --add-service ssh --permanent
Which of the following commands can be used to display memory statistics? (Choose all that apply.)
free sar vmstat
Which of the following commands can be used to scan the available ports on computers within your organization?
nmap
On which part of the maintenance cycle do Linux administrators spend the most time?
monitoring
Which of the following UFW commands can be used to view configured firewall rules?
ufw status
To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?
True
When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?
False
When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?
Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
Which of the following steps is not a common troubleshooting procedure?
Delegate responsibility.
Which of the following actions should you first take to secure your Linux computer against network attacks?
Ensure that only necessary services are running
Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?
False
Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)
LUKS GPG
What will the command sar -W 3 50 do?
Take 50 swap statistics every 3 seconds
What are best practices for securing a local Linux server? (Choose all that apply.)
Lock the server in a server closet Ensure that SELinux or AppArmor is used to protect key services Use encryption for files and network traffic
Which option can be added to the ls or ps command to view the SELinux label?
Z
Which file contains information regarding the users, computers, and commands used by the sudo command?
/etc/sudoers
Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?
sa19
Which command can increase the number of filehandles that programs can open in a shell?
ulimit