The first test(OSP201)
which directory does the FHS recommend for locating the configuration files?
/etc/
Which file is used to configure the various mounting options of a file system upon boot?
/etc/fstab
Which of the following file is used to configure ACLs for a filesystem
/etc/fstab
Script in which of the following directories can be used to deactive a currently running services
/etc/init.d/
Which of the following directories contains scripts that control servies
/etc/init.d/
From which of the following files do iptables read ports of well-known services?
/etc/services
Which of the following files contains information about time limits on a password
/etc/shadow
Which of the following files is not normally readable by all users
/etc/shadow
Which of the following files Is not a part of the shadow password suite?
/etc/sudoers
LUKS is a specification for _____ ?
disk encryption
Red Hat and Ubuntu are examples of
distributions
Which service script in the /etc/init.d/ directory is not related to SELinux
dund
You configured quotas on a Linux system. Which command do you use to edit the quota of a specific user
edquota
Which of the following commands starts a console-based Web browser
elinks
Which of the following filesystem formats is best suited for a smailler filesystem
ext2
The ___ command searches for all files owned by the group named audio. Assume you're logged into the root administrative account
find / -group audio
Which of the following is NOT a potential security issue with respect to the Linux GUI?
Linux GUI applications can be assessed over an SSH connection.
What is the first most important step in responding to a compromised system?
Follow what is outlined in the incident response plan.
What is a common use for Linux in the LAN-to-WAN Domain
Gateway
Which of the following directories contain GPG private and public key
.gnupg
Tuning the kernel parameters, such as the networking functionality can be accomplished by editing the ____ file?
/etc/sysctl.conf
The file to configure the various logging subsystem facilities for sysklogd package is
/etc/syslog.conf
Enter the full path to the main configuration file associated with the extended internet super server:
/etc/xinetd.conf
What part of a network is best for bastion servers
A DMZ
which of the following is an advantage of compiling a customized kernel rather than using a vendor-supplied kernel
A custom kernel is easier to update and maintai
Which of the following statements best describes the structure of the Linux kernel?
A monolithic core with modular components
Which of the following is a positive effect of virtualization on security?
Additional virtual machines make it possible to configure more bastion hosts
Which of the following hardware components is NOT used to boot a Linux system?
An Ethernet port
Kernels released for different architectures vary because different platforms have different
CPU's
From the following options, name the component that is NOT part of a Linux User Domain.
Computer users
What are the advantages of virtualization in a Linux infrastructure?
Cost savings by purchasing less hardware - Security advantages with more bastion hosts
The read, write and execute permissions of a file would be an example of a?
Discretionary access control
How do you exit Vi's insert mode in order to type command-mode commands?
Esc key
Which of the following client can connect to a Microsoft Exchange server
Evolution
Which of the following PolicyKit concepts is associated with configuring access rules to special desktop tools by user
Explicit authorizations
Which of the following laws ensures that all U.S-based financial institutions protect personal financial information of their clients?
GLBA
The open source license associated with the GNU project is __________.
General Public License (GPL)
Which of the following security certifications is associated with open source software?
OSPA
the iptables command is used to configure
The Firewall
Which of the following roots of trust is associated with the BIOS/UEFI?
The Root Trust for Networking
What will be the impact of changing the GRUB option timeout=5 to timeout=0 on the Linux OS?
The boot loader will immediately boot the operating system into the default kernel.
You type the following command: $ runlevel 5 3 What can you tell about your runlevel status?
The current runlevel is 3. The previous runlevel is 5.
Under normal circumstances, what happens when a system can't be booted with a newly installed Linux kernel?
The old kernel is still available through the boot loader
Which of the following is a difference between security vulnerabilities associated with open source software and proprietary software?
Typically, open source software vulnerabilities are immediately made public
Which of the following is an example of discretionary access controls?
User-defined read, write, and execute permissions
Which of the following kernel types is most likely to work with the smallest amount of RAM
Virtual machine
Which of the following Samba directives specify permissions of files created on a shared network directory
creat_mask
Which of the following commands is associated with the Linux unified key setup disk encryption specification
cryptsetup
The command that lists the current ACL rules on the local file named test1 is ______. Assume your user account is the owner of file test1
getfacl test1
A user only needs access to execute networking-related commands. What type of access should be granted using the principle of least privilege?
given sudo access to all of root's commands/to Networking