Linux Final
Where do individual users store procmail recipes to apply to their own email messages?
$HOME/.procmailrc
To verify a tar backup immediately after it is created,you see which of the following tar commands options?
--diff --compare -d -W
Which of the following tar commands options would employ gzip compression for creating a backup tarball?
--gzip
Which of the following mdadm options would show in the RAID array in which the /dev/sdc1 drive has membership?
--misc --examine /dev/sdc1
To shut down your system without sending a message to users, use which of the following /sbin/shutdown options?
--no-wall
Which iptables option adds a new rule to a chain?
-A
Which nmap option specifies that is should determine the fingerprint of the remote system?
-A
Which of the following mdadm command options chooses the mode to make a RAID array?
-C
Each entry in the /etc/fstab has several required fields. Which of the following could describe one of the fields?
-Filesystem check priority -Mount point -Filesystem type
Which of the following are true about LV snapshots?
-LV snapshots can be mounted to the directory -LV sapshots are LVs themselves
Which of the following allows multiple partitions or whole disks to be grouped together and used as a single drive?
-Logical volume management -RAID
Which iptables option defines the default policy for a chain?
-P
Which of the following are true about the dd command?
-The dd command can be used to zero-out a hard disk -The dd command can be used to create a low-level copy of a hard drive
The number c344d0f9-6d54-4a92-ad4d-c5a44fac2eeb identifies a filesystem that need to be temporarily mounted. Which option for the needed command should you choose?
-U
Which of the following indicates a tape device that automatically rewinds?
/dev/st0 /dev/ht1
NFS export configuration files are typically located where?
/etc/, /etc/exports.d/
What text file does the newaliases command read to create the aliases database?
/etc/aliases
Where are the courier configuration files located?
/etc/courier
What does the DHCPd application use for its configuration file?
/etc/dhcp/dhcpd.conf
Where does Dovecot store its configuration settings?
/etc/dovecot and dovecot.conf
Which configuration file contains the SSV default runlevel?
/etc/inittab
When using a single configuration file for PAM, where is it located?
/etc/pam.conf
What folder does PAM use to store multiple application configuration files?
/etc/pam.d
Where are the Postfix configuration files located?
/etc/postfix
What files does the email administrator use to store recipes to apply to all incoming email messages?
/etc/procmail
Which file contains a list of DNS servers that the Linux system can use to resolve hostnames?
/etc/resolv.conf
What file contains a list of standard application ports?
/etc/services
You want to change the AutoFS service's master map to a different configuration file than the /etc/auto.master file. Which configuration file might you edit to accomplish this, depending on your distribution?
/etc/sysconfig/autofs
What folder do Red Hat-based systems use to store network configuration files?
/etc/sysconfig/network-scripts
Where are the udevd rules stored?
/etc/udev/rules.d
Where are the udevd configuration settings stored?
/etc/udev/udev.conf
Which of the following Linux directories should be included in a backup when you plan onn using the backup data in full system restores?
/home/ /bin/
Where is the dynamic pseudo-directory the kernel creates to peek at kernel settings and performance statistics located?
/proc
Which one of the following files contains a list of all of the filesystems your system supports?
/proc/filesystems
After you issue the modprobe raid6 command using super use privileges on your system, which file should you check to determine if software RAID is supported on your system?
/proc/mdstat
Current RAID array status is held in what file?
/proc/mdstat
Which of the following are typical NFS share directory locations?
/svr/, /var/
What file do you use to track IP addresses currently assigned by DHCPd?
/var/lib/dhcp/dhcpd.leases
Where are iSCSI discovery records stored?
/var/lib/iscsi/send_targets /var/lib/iscsi/nodes
What folder do most Linux distributions use to store boot logs?
/var/log
What log file does Postfix use to store system messages?
/var/log/maillog
In which of the following directories would you typically find samba log files?
/var/log/samba/
The default zone databases are typically stored in which directories?
/var/named/directory, /etc/bind/directory
What directory does Postfix use for storing email messages as it processes them?
/var/spool/postfix
What DHCP option number defines the subnet mask assigned to a client?
1
Which of the following Linux directories should be included in a backup when you plan on using the backup data in full system restores?
/bin/ /home/
Where is the EFI System Parition(ESP) stored on Linux systems?
/boot/efi
Where are the GRUB Legacy configuration files stored?
/boot/grub
Where are GRUB2 configuration files stored?
/boot/grub /etc/grub.d
When setting up a chroot jail, the new root directory is typically which directory?
/chroot/named/, /chroot/bind/
Which rule address format tells Snort only to look for packets going from the 10.0.0.1 address to the 10.0.0.2 address?
10.0.0.1 -> 10.0.0.2
How many bits are used in an IPv6 address?
128
What runlevel is the default for Debian-based systems?
2
Which of the following is a correct netmask value?
255.255.255.0
What HTTP server response code indicates that the file requested by the client was not found?
404
On which of the following drive types can the hdparm utility be used?
ATAPI SATA PATA SCSI
Which Apache log file contains information about what web page requests were made by clients?
Access.log
What directive tells the Apache server to redirect .php files to the PHP server process?
AddHandler
Which type of hardware deices can you connect to the Linux system as it's running?
Hotplug
What Apache utility program allows you to create text userid/password files?
Htpasswd
When installing a program from source code, which of the following installation fields typically can provide you with additional installation information?
INSTALL README
What number designates both an iSCSI target server and an iSCSI disk being offered by that target?
IQN
What configuration directive defines what information appears in the Apache log file?
LogFormat
What type of address is used so that local applications can use network protocols to communicate with each other?
Loopback address
What Courier configuration setting determines how many remote clients can connect at the same time?
MAXDAEMONS
Which of the following are considered to be system resource-monitoring solutions?
MRTG collectd Nagios
Which mailbox style uses seperate files to store each message for each user?
Maildir
Which of the following Samba directives can be used to set whether passwords are required to access this file share service?
Public
Using a btrfs filesystem, which RAID configuration can be implemented?
RAID 1 RAID 0 RAID 6
Which of the following RAID array structures are considered fault tolerant?
RAID 1 RAID 10 RAID 6 RAID 5
Which one of the following RAID structures is also called disk striping with double parity?
RAID 6
What program does the kernel use to start other programs?
GRUB2 init
What standard defines how a client formates the content contained in a web page?
HTML
What protocol defines how a web server responds to a client requests?
HTTP
Which part of a Linux system manages system memory?
Kernel
Which of the following is true concerning LEs?
LEs are mapped to VG physical extents.
Which was the first bootloader program used in Linux?
LILO
Which iptables policy is used to send a return packet back to the source indicating that the packet was dropped?
REJECT
A program or library routine that creates a DNS query, checks its own cache for the answer, and if it doesn't find it there, sends the query to another name server, is called what?
Resolver
In IP-Based virtual hosting, what directive defines the different IP addresses for the server to listen on?
Listen
Which of the following are methods for securing your DNS services?
Run only BIND services on the server, Run the BIND daemon as a non-root user, Implement a dual horizon server, Hide BIND version information
A zone database has resource records of various types. One such record identifies the authority zone's start and includes the zone's authoritative data. Which one of the following is this resource record type?
SOA
Assume that money is plentiful,and you want the fastest media to use for your company's backups. Based on that information, which is the best backup media choice?
SSD
What directive tells the Apache server the location of the SSL certificate?
SSLCertificateFile
What section in the nginx configuration file defines the basic server settings?
Server
In name-based virtual hosting, what directive defines the domain name used?
ServerName
To set up a Samba share, you need to modify the main Samba configuration file. Which of the following is this file?
Smb.conf
Which of the following Linux daemons may be used in providing Samba services?
Smbd, Cupsd, nmbd
Which Snort mode dumps packets to the display for viewing?
Sniffer Mode
What application is a network intrusion detection system?
Snort
Which transport layer protocol guarantees packet delivery?
TCP
The .edu domain is considered which domain type?
TLD
Once you have modified the main Samba configuration file, what should you do next?
Test the Samba configuration syntax with testparm
Why might authoritative zone information be copied from the primary name server's zone databases over to the secondary name server?
The secondary server's BIND daemon has started up, The rndc utility was used on the secondary server and a manual zone data refresh was requested, The secondary server's zone data's refresh time has expired
What does the following procmail recipe do to incoming email messages? :0 c messages
The system copies all incoming emails to the message directory
What directive does Squid use to define client authentication settings?
With_param
For setting up Samba in a mixed environment of Windows and Linux systems, it is essential to set the ________ directive to the Windows workgroup or domain name and not an FQDN.
Workgroup
Which if the following directives are used in various FTP server daemons to allow anonymous uploads?
Write_enable=YES, AnonymousCantUpload no, anon_upload_enable=YES, anon_mkdir_write_enable=YES
You have a Btrf filesystem that has perormed well for a long time. However for some reason, it has suffered a catastrophic problem and you need to restore files. Which utility should you use?
btrfs restore
Which make utility target is commonly used to generate a compressed kernel binary file?
bzimage
What command displays the runlevels in which a program will be started?
chkconfig
You've just created a new disk partition, /dev/sde3, and want to prepare it as swap space. Which command do you use?
mkswap /dev/sde3
Assuming that you have or can obtain super privileges, which of the following commands would you allow you to make an ext2 filesystem on the /dev/sdd2 partition?
mke2fs /dev/sdd2 mkfs -t ext2 /dev/sdd2 mkfs.ext2 /dev/sdd2
Which command should you use to install a module if you don't know its filename?
modprobe
Which commands should you sue to install a module if you don't know its filename?
modprobe
Which command allows you to append a partition to the virtual directory on a running Linux system?
mount
Which of the following are legitimate groupings in the BIND's primary configuration file, named.conf?
options, logging, include, comments
Which PAM module provides restrictions on user passwords?
pam_cracklib.so
Which PAM module supports using a network directory to authenticate users?
pam_ldap.so
Which PAM module supports using the standard /etc/passwd and /etc/shadow files for authentication?
pam_unix.so
Which program should you used to create an initial RAM disk for a Debian-based system?
mkinitramfs
Which command should be used to create an ISO?
mkisofs
What tool allows you to send ICMP messages to a remote host to test network connectivity?
ping
Which of the following LVM utilities will designate a partition as a PV?
pvcreate
What DHCPd configuration option setting do you use to define the pool of IP addresses to assign to network clients?
range
Which PAM control entry terminates the application if the authentication fails?
requisite
Which of the following /etc/exports directive would be important for trying to create a read-only share's configuration record?
ro, async
What DHCPd option setting do you use to define the default router for network clients?
rotuer
Which of the following rsync commands is the proper way to send a backup over the network to the remote host, ServerA, while having the transfer encrypted using OpenSSH?
rysnc-av ProjectServerA: ~/
Which of the following will show CPU usage infomation 20 times in 2 second intervals?
sar 2 20
How can you use the telnet command to detect an open port?
telnet address port
What part of the LDAP database defines a template for a set of attributes that can be assigned to an object?
the object class
Which of the following monitoring commands allow you to view systme memory information?
top vmstat free
You have generated a new UUID and want to assign it to an unmounted ext4 filesystem Which utility do you use?
tune2fs
What program does Linux use to detect hotplug devices and load the appropriate modules?
udevd
What command do Debian systems use to set the runlevels for programs?
update-rc.d
Assuming that you have super user privileges to temporarily attach a formatted filesystem to the Linux virtual directory structure, which of the following should you do?
use the mount command with the proper options and parameters.
Which of the following is not a utility for adjusting the ext2, ext3, and ext4 filesystems?
uuidgen
You've just finished create vg01. What utility would be the best one to check it?
vgdisplay
Which of the following commands will allow a message to be sent to any tty terminals with write access allowed?
write wall
Which of the following commands checks for inconsistencies but does not conduct any repairs for an XFS filesystem?
xfs_check
What Linux command do you use to create firewall rules on the system?
iptables
What command would you use to change the current runlevel?
telinit init
What do you call a vulnerability that allows an attacker to gain access to a system?
Attack vector
To delete an unmounted RAID array, you must do which of the following?
-delete RAID array drives' superblocks -stop the RAID array
Which of the following are true about Linux system memory?
-swap can also be called virtual memory -memory for an idle process can be swapped out to swap space
When using the exportfs command to display NFS share information on an NFS server, which if the following operates is the most helpful?
-v
Which option in the lsusb command displays detailed information about the USB devices?
-v
Which option of the netcat command allows it to scan multiple ports?
-z
What file extension do UEFI bootloader files use?
.efi
When using the tar command for an incremental backup, a snapshot file is created. This snapshot file should have which of the following file extensions as part of its name?
.snar
What part of the LDAP database defines the information stored for an object?
Attributes
What directive points to the userid/password file that controls access?
AuthUserFile
What configuration feature allows you to apply directive to specific folders in the file system?
<Directory>
Which of the following best describes a Reverse Zone?
A special zone that provides a mapping from an IP address to an FQDN
Which of the following software packages are GUI and/or web-based backup solutions?
Amanda Duplicity Bacula
Which usernames are typically used on the FTP server for handling anonymous connections?
Anonymous, ftp
What utility allows you to stop Apache web server gracefully?
Apache2ctl
What utility allows you to test Apache web server configuration before actually starting the server?
Apache2ctl
Which of the following software provide either full or partial DNS protocol implementations?
BIND, dnsmasq, pdnsd, Bundy, PoweDNS
Which kernel file type is used to boot the Linux system?
Binary file
Which of the following are considered extensions of the ISO9660 standard?
El Torito Joliet Rock Ridge
What dynamic web programming method allows the Apache server to utilize an external program interpreter?
CGI
Which of the following are legal zone statement classes?
CH, HS, IN
What does a web proxy server do?
Caches web requests from multiple clients, restricts what websites clients can access.
What is used to assign an IP address automatically to a client?
DHCP
What device setting defines a host that maps a hostname to an IP address?
DNS server
What network setting defines the network device that routes packets intended for hosts on remote networks?
Default Router
What is the unique name assigned to each object in the LDAP database called?
Distiguished Name
What directive defines the location on the server that will be shared with clients?
DocumentRoot
Your company's legal department has decided that a login notification is needed on a Linux system that you manage, warning that unauthorized system use is prohibited. Which method is the best one for deploying this legal notificaton?
Edit the /etc/issue file, and place the notification there
Which of the following NDD utilities would show NFS share information specifically?
Exportfs, showmount
Your co-worker, also a system admin, hands you a SSD and says "This has all the files on it that were created and/or modified since the system's last full backup." Which of the following backup types can this backup be?
Incremental Differential
What type of software can warn you of an active attack on your system?
Intrusion Detection System IDS
Which of the following are legal zone type directives?
Master, hint
Which mailbox style stores all messages for a user in a single file?
Mbox
What Dovecot setting specifies the authentication methods that the server supports?
Mechanisms
What method does Linux use to load device drivers into the kernel?
Modules
The NFS service that manages NFS client mount requests on the NFS server is which of the following?
Mountd
What system allows you to connect clients on a private network address to outside servers?
NAT
What network layer feature defines the network to which the system is connected?
Netmask
What OpenVAS feature allows it to simulate different vulnerability attacks on the system it scans?
Network Vulnerability Test NVT
What two parts make up an ip address?
Network address and host address
You have super user privileges, and you type the command fsck.xfs to run a filesystem check on an XFS filesystem. What will happen?
Nothing
Which if the following statements are true about FTP passive mode?
Only the FTP server is active in establishing the connections, only the FTP client is active in establishing the connections
Which of the following is not true concerning PEs.
PE block size is set during the process of designating a PV
Which is a designated unused disk partition or drive that can be used by LVM?
PV
What type of release can you use to upgrade an existing kernel to a newer version?
Patch release
Which network layer used WPA encryption?
Physical
Which of the following server combinations could be the minimum two name servers required for a zone?
Primary server and secondary server, Primary server and forwarding server, Primary server and caching server
What MDA program is commonly used to forward email messages to local mailboxes?
Procmail
A logging category directive determines what?
The DNS message types to be logged
Where does the firmware first look for a Linux bootloader program?
The Master Boot Record (MBR)
Where is the Master Boot Record located?
The first sector of the first hard drive on the system
Domain Name Space is broken into different zones. Which of the following could be one of those zones?
The hint zone, A first-level domain and all of its subdomains, A first-level domain and a portion of its subdomains, the root zone
What does the HOME_NET variable define in the Snort configuration?
The local addresses to monitor
How many private network address ranges does IPv4 support?
Three
What directive should you use to allow system users to create their own web folders?
UserDir
In the BIND DNSSEC security extension, the encryption key used to digitally sign a particular zone's resource records is called what?
Zone signing key
What program does the workstation firmware start a boot time?
a bootloader
When setting up a local DNS caching-only server, which directives should be set and or modified in the name.conf file?
acl, allow-query, listen-on, recursion yes
Where does the workstation BIOS attempt to find a bootloader program?
an internal hard drive an external hard drive a DVD drive remote server a usb memory stick
You need to determine a filesystem's UUID. Which utility can help you do this?
blkid
During the process of installing a program from source, which of the following creates or updates the Makefile with the Makefile.in file's contents and what it finds on your system?
configure
Which of the following is not an mdadm command mode?
delete mode
What Linux command lets you examine the most recent boot messages?
dmesg
Which utility is used to create either TSIG or DNSSEC keys?
dnssec-keygen
Which of the following encrypted iflesystems is a layered filesystem?
eCryptfs
What option sets the wireless access point name in the iwconfig command?
essid
What value do IPv6 link local addresses start with?
fe80
What program allows you to fix corrupt hard drive partitions?
fsck
Which make utility target used a graphical interface to configure the kernel?
gconfig
What command must you run to generate the GRUB2 grub.cfg configuration file?
grub-mkconfig
What DHCpd configuration setting defines the MAC address of a device so that you can assign it a static IP address.
hardware
What DHCP configuration feature bundles settings assigned to a specific client?
host
Which configuration line sets a dynamic Ip address for a Debian system?
iface eth0 inet dhcp
Which ifconfig format correctly assigns an IP address and netmask to the eth0 interface?
ifconfig eth0 down 192.168.1.50 netmask 255.255.255.0
Which of the following map types can be found in the /etc/auto.master file?
indirect direct built-in
What command can you use both to display and to set the IP address, netmask, and default router values?
ip
What command displays all of the available wireless networks in your area?
iwlist
What file contains the fail2ban rules?
jail.conf
What LDAP client application allows you to add new objects to the LDAP database?
ldapadd
Which command should you use to list all of the the installed modules?
lsmod
Which command should you use to display information about USB devices installed on the system?
lsusb
To rename an LV, which utility should you use?
lvrename
What configuration setting in Postfix must you change to forward all incoming email messages to procmail?
mailbox_command
What sendmail emulation command in Postfix allows you to check on the number of messages waiting in the mail queue to be delivered?
mailq
What is the Postfix configuration file that controls mail processing?
main.cf
What is the name of the main postfix?
master
what is the Postfix configuration file that manages when Postfix processes start and stop?
master.cf
Which make utility target should you use to remove any old object files from a previous compile?
mrproper
To control a magnetic tape for backups, use the ____program
mt
Which section in the smb.conf file might you find a file share defined?
myshare
The BIND daemon is which program in the /usr/sbin/directory?
named
Which nc command format listens for incoming HTTP connections to simulate a web server?
nc -l 80
Which command can display a list of TCP ports that are listening for incoming communication?
netstat
which sendmail emulation command converts the text alias entries into the binary aliases database file?
newaliases
Which of the following sdparm commands options will show all of the common mode parameters for adesignated device?
none of the above
For the Samba passdb backend directive, which of the following are legal settings?
tdbsam, smbpasswd, ldapsam
Ignoring distribution differences and assuming you have the appropriate privileges, which of the following commands will stop the BIND service?
service bind9 stop, kill -s SIGTERN BIND_PID, rndc stop, systemctl stop named
Which PAM feature type logs authentication attempts to a log file?
session
What LDAP server program allows you to add new objects to the LDAP database?
slapadd
What OpenLDAP program runs as the main LDAP server, listening for LDAP client requests?
slapd
You have a disk drive partition /dev/sdc3 that supports SMART and has it enabled. Assuming that you have super user privileges, which command will show you a quick summary status, including whether or not it has passed the overall health self-assessment test?
smartctl -H /dev/sdc3
Assuming appropriate access is granted, the _______ command allows FTP-style access to a Sambra share?
smbclient
What is the area on the hard disk called that is used as memory storage?
swap space
Which command should be used to force filesystems to write metadata residing in memory to the filesystem media structures?
sync
What command allows you to change kernel settings during runtime?
sysctl
Which command allows you to view network packets?
tcpdump