NOS 120 Study Guide Ch. 14
When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented? Select one: a. CUPS b. Kerberos c. OTP d. Finger
OTP
If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? Select one: a. brstat b. ip bridge c. netbr d. brctl
brctl
Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system? Select one: a. lsuefi b. dmidecode c. biosinfo d. hwls
dmidecode
If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? Select one: a. chkfs b. blocks c. chkdisk d. fsck
fsck
Which of the following can you use to configure firewall rules for IPv6 on a Linux system? Select one: a. fw --ipv6 b. ip6tables c. netfilter -6 d. fw6
ip6tables
Which of the following permissions should a standard user have on the /etc/shadow file? Select one: a. read b. read, write, and execute c. read and write d. none of the above
none of the above
Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? Select one: a. ethstat b. ping c. finger d. transit
ping
Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? Select one: a. su b. sudo c. doas d. sudoer
sudo
If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? Select one: a. noop b. cfq c. deadline d. testwr
testwr
When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? Select one or more: a. mtr b. tracert c. traceroute d. tracepath
tracepath traceroute mtr
Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? Select one: a. wshark b. nshark c. ushark d. tshark
tshark
Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) Select one or more: a. udevadm --reload b. udevadm control --reload c. udevadm control -R d. udevadm control -r
udevadm control -R udevadm control --reload
Which of the following options for the gpg command will specify the key that should be retrieved? Select one: a. --request b. --recv-keys c. --get-key d. --get
--recv-keys
Which of the following options for the iptables command will delete all rules for all chains? Select one: a. -R b. -D c. -F d. -C
-F
On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? Select one: a. /etc/cmd.conf b. /etc/init.conf c. /etc/keys.conf d. /etc/inittab
/etc/inittab
If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? Select one: a. /etc/banner.conf b. /etc/nologin.txt c. /etc/deny.login d. /etc/warning.txt
/etc/nologin.txt
Which of the following files contains the encrypted passwords for users on a modern Linux system by default? Select one: a. /etc/passwd b. /etc/shadow c. /etc/psh d. /etc/pwenc
/etc/shadow
Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? Select one: a. /etc/sudoers b. /etc/rc.d/sudoers.conf c. /etc/sudo.conf d. /etc/su.conf
/etc/sudoers
Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? Select one: a. Configure /etc/fstab to mount the partition. b. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it. c. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. d. Configure /etc/crypttab to mount the partition.
Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.
In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? Select one: a. public b. DMZ c. trusted d. internal
DMZ
Which of the following does the -r option for the gpg command specify? Select one: a. Encrypt for the user id given. b. Remote key server to query. c. Retrieve keys for given key ID. d. Revoke keys from the key server.
Encrypt for the user id given.
Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? Select one: a. Syslog b. Kerberos c. TFTP d. Telnet
Kerberos
Which of the following are examples of multifactor authentication? Select one: a. Password and PIN b. Password and fingerprint reader c. Thumbprint reader and facial recognition d. A USB token and a Common Access Card
Password and fingerprint reader
Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? Select one: a. ufw b. netfilter c. iptables d. TCP Wrapper
TCP Wrapper
When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration? Select one: a. There must be at least 3 characters that are different from their previous password. b. Users cannot re-use their last 3 passwords. c. The minimum password length has to be at least 3 characters long. d. Users must use at least 3 characters as numbers in their passwords.
Users must use at least 3 characters as numbers in their passwords.