The first test(OSP201)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

which directory does the FHS recommend for locating the configuration files?

/etc/

Which file is used to configure the various mounting options of a file system upon boot?

/etc/fstab

Which of the following file is used to configure ACLs for a filesystem

/etc/fstab

Script in which of the following directories can be used to deactive a currently running services

/etc/init.d/

Which of the following directories contains scripts that control servies

/etc/init.d/

From which of the following files do iptables read ports of well-known services?

/etc/services

Which of the following files contains information about time limits on a password

/etc/shadow

Which of the following files is not normally readable by all users

/etc/shadow

Which of the following files Is not a part of the shadow password suite?

/etc/sudoers

LUKS is a specification for _____ ?

disk encryption

Red Hat and Ubuntu are examples of

distributions

Which service script in the /etc/init.d/ directory is not related to SELinux

dund

You configured quotas on a Linux system. Which command do you use to edit the quota of a specific user

edquota

Which of the following commands starts a console-based Web browser

elinks

Which of the following filesystem formats is best suited for a smailler filesystem

ext2

The ___ command searches for all files owned by the group named audio. Assume you're logged into the root administrative account

find / -group audio

Which of the following is NOT a potential security issue with respect to the Linux GUI?

Linux GUI applications can be assessed over an SSH connection.

What is the first most important step in responding to a compromised system?

Follow what is outlined in the incident response plan.

What is a common use for Linux in the LAN-to-WAN Domain

Gateway

Which of the following directories contain GPG private and public key

.gnupg

Tuning the kernel parameters, such as the networking functionality can be accomplished by editing the ____ file?

/etc/sysctl.conf

The file to configure the various logging subsystem facilities for sysklogd package is

/etc/syslog.conf

Enter the full path to the main configuration file associated with the extended internet super server:

/etc/xinetd.conf

What part of a network is best for bastion servers

A DMZ

which of the following is an advantage of compiling a customized kernel rather than using a vendor-supplied kernel

A custom kernel is easier to update and maintai

Which of the following statements best describes the structure of the Linux kernel?

A monolithic core with modular components

Which of the following is a positive effect of virtualization on security?

Additional virtual machines make it possible to configure more bastion hosts

Which of the following hardware components is NOT used to boot a Linux system?

An Ethernet port

Kernels released for different architectures vary because different platforms have different

CPU's

From the following options, name the component that is NOT part of a Linux User Domain.

Computer users

What are the advantages of virtualization in a Linux infrastructure?

Cost savings by purchasing less hardware - Security advantages with more bastion hosts

The read, write and execute permissions of a file would be an example of a?

Discretionary access control

How do you exit Vi's insert mode in order to type command-mode commands?

Esc key

Which of the following client can connect to a Microsoft Exchange server

Evolution

Which of the following PolicyKit concepts is associated with configuring access rules to special desktop tools by user

Explicit authorizations

Which of the following laws ensures that all U.S-based financial institutions protect personal financial information of their clients?

GLBA

The open source license associated with the GNU project is __________.

General Public License (GPL)

Which of the following security certifications is associated with open source software?

OSPA

the iptables command is used to configure

The Firewall

Which of the following roots of trust is associated with the BIOS/UEFI?

The Root Trust for Networking

What will be the impact of changing the GRUB option timeout=5 to timeout=0 on the Linux OS?

The boot loader will immediately boot the operating system into the default kernel.

You type the following command: $ runlevel 5 3 What can you tell about your runlevel status?

The current runlevel is 3. The previous runlevel is 5.

Under normal circumstances, what happens when a system can't be booted with a newly installed Linux kernel?

The old kernel is still available through the boot loader

Which of the following is a difference between security vulnerabilities associated with open source software and proprietary software?

Typically, open source software vulnerabilities are immediately made public

Which of the following is an example of discretionary access controls?

User-defined read, write, and execute permissions

Which of the following kernel types is most likely to work with the smallest amount of RAM

Virtual machine

Which of the following Samba directives specify permissions of files created on a shared network directory

creat_mask

Which of the following commands is associated with the Linux unified key setup disk encryption specification

cryptsetup

The command that lists the current ACL rules on the local file named test1 is ______. Assume your user account is the owner of file test1

getfacl test1

A user only needs access to execute networking-related commands. What type of access should be granted using the principle of least privilege?

given sudo access to all of root's commands/to Networking


संबंधित स्टडी सेट्स

GEB module 4 quiz (chapter 11 & 12)

View Set

Cancer & Oncology Nursing NCLEX Practice Quiz 4

View Set

Chapter 10 Pre-Class Quiz Questions

View Set

Guided Reading - Module 5 - Spinal Cord/Column

View Set

Lesson 12 Transformations in Europe

View Set