Ch. 14 Questions

Ace your homework & exams now with Quizwiz!

8.) Which of the following steps is not a common troubleshooting procedure?

C. Delegate responsibility

15.) Which of the following commands can be used to scan the available ports on computers within your organization?

C. nmap

12.) The private key is used when creating a digital signature. True or False?

TRUE

2.) Which of the following files is likely to be found in the /var/log/sa directory n a Fedora 20 system over time?

C. sa19

16.) Which of the following are common assistive technologies (Choose all that apply.)

a. mouse keys c. sticky keys d. on-screen keyboard

17.) Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (choose all that apply)

A. Aide D. snort

7.) What type of iptables chain targets traffic that is destined for the local computer?

A. INPUT

4.) Which of the following commands can be used to display memory statistics? (Choose all that apply)

A. free B. sar c. vstat

20.) What are best practices for securing a Linux server? (choose all that apply.)

A. lock the server in a server closet D. set the default run level to 1 (single user mode) C. Ensure that SELInux or AppArmor is used to protect key services

1.) On which part of the maintenance cycle do Linux administrators spend the most time?

A. monitoring

14.) What will the command sar -W 3 50 do?

B. Take 50 swap statistics every 3 seconds

13.) Which of the following actions should you first take to secure your Linux computer against network attacks?

B. ensure that only necessary services are running

5.) Which command indicates the shared libraries required by a certain executable program?

B. ldd

10.) Which file contains information regarding the users, computers and commands used by the sudo command?

D. /etc/sudoers

19.) When performing a sar -u command, you notice that %idle is consistently 10 percent. Is this good or bad?

D. bad because the processor is idol 10 percent of the time and perhaps a new hard disk is required

9.) Which of the following firewlld commands can be used to allow incoming SSH connections the next time the system is booted?

D. firewall -cmd ---add-service ssh --permanent

18.) When the fsck command cannot repair a nonroot filesystem, you should immeidateley restore all data from tape backup. True or False?

FALSE

3.) The lspci command can be used to isolate problems with X Windows. True or False?

FALSE

6.) RSA is a common symmetric encryption algorithm used by SSH and GPG True or False?

FALSE

11.) Which command can increase the number of files handles that programs can open in a shell?

b. ulmit


Related study sets

what is my favorite food best to disgusting

View Set

ATI Introduction to Health Assessment Test

View Set

MICRO Week 8, MICRO Week 13 & 14, Week 11 Micro, MICRO Week 9, MICRO week 10, Week 10 Micro

View Set

collaboration in and across teams

View Set

clinical decision making practice questions

View Set

CH 6 ECON: Demand, Supply, and Prices

View Set

bsan 101 Excel Chapter 1: Testbank Quiz

View Set

Federal Income Tax I--Chapter 10-12 Test

View Set