Linux Chapter 14 / bdale

Ace your homework & exams now with Quizwiz!

Which of the following commands can you use to list users who have been locked out by pam_faillock.so? Group of answer choices faillock pam_faillock pam_tally2 locklist

faillock

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this? Group of answer choices ethconfig 0 netconfig eth0 ifconfig eth0 dhcpaddr eth0

ifconfig eth0

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system? Group of answer choices dmidecode biosinfo hwls lsuefi

dmidecode

Which of the following commands can be used to view the quota for a user? Group of answer choices quotas jsmith quotadisp jsmith edquota -u jsmith quota --view jmith

edquota -u jsmith

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? Group of answer choices finger ethstat transit ping

ping

Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command? Group of answer choices sudoer visudo sudoers edsudo

visudo

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system? Group of answer choices vmctl vmpager vmstat vmmview

vmstat

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? Group of answer choices /etc/warning.txt /etc/deny.login /etc/nologin.txt /etc/banner.conf

/etc/nologin.txt

Which of the following options for the gpg command will specify the key that should be retrieved? Group of answer choices --get-key --recv-keys --request --get

--recv-keys

Which of the following files does a TCP wrapper check before starting a network daemon? Group of answer choices /etc/wrapper.allow and /etc/wrapper.deny /etc/tcp.allow and /etc/tcp.deny /etc/hosts.allow and /etc/hosts.deny /etc/daemon.allow and /etc/daemon.deny

/etc/hosts.allow and /etc/hosts.deny

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? Group of answer choices /etc/inittab /etc/init.conf /etc/keys.conf /etc/cmd.conf

/etc/inittab

Which of the following files contains the encrypted passwords for users on a modern Linux system by default? Group of answer choices /etc/psh /etc/shadow /etc/pwenc /etc/passwd

/etc/shadow

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? Group of answer choices /etc/sudoers /etc/sudo.conf /etc/rc.d/sudoers.conf /etc/su.conf

/etc/sudoers

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? Group of answer choices brstat ip bridge brctl netbr

brctl

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration Group of answer choices There must be at least 3 characters that are different from their previous password. Users cannot re-use their last 3 passwords. The minimum password length has to be at least 3 characters long. Users must use at least 3 characters as numbers in their passwords.

Users must use at least 3 characters as numbers in their passwords.

Which of the following is not a valid Apparmor command? Group of answer choices aa-unconfined aa-trust aa-complain aa-enforce

aa-trust

Which of the following can you use to configure firewall rules for IPv6 on a Linux system? Group of answer choices ip6tables fw --ipv6 fw6 netfilter -6

ip6tables

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? Group of answer choices mtr tracepath tracert traceroute

mtr tracepath traceroute

Which of the following utilities can be used by a system administrator to determine which services are responding to network requests? Group of answer choices netscan portscan pmap nmap

nmap

Which of the following permissions should a standard user have on the /etc/shadow file? Group of answer choices read, write, and execute none of the above read read and write

none of the above

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password? Group of answer choices su user sudoer switchuser

su

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? Group of answer choices sudoer sudo su doas

sudo

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.) Group of answer choices 22 80 21 23

21 23

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? Group of answer choices blocks chkdisk fsck chkfs

fsck

Which of the following commands will generate a GPG public/private key pair? Group of answer choices gpg --new-key gpg-generate gpg-key --generate gpg --gen-key

gpg --gen-key

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? Group of answer choices tshark wshark ushark nshark

tshark

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) Group of answer choices udevadm control -r udevadm --reload udevadm control --reload udevadm control -R

udevadm control --reload udevadm control -R

Which of the following commands will change the SELinux security context of a file? Group of answer choices sechange chcon secontext scont

chcon

Which of the following options for the iptables command will delete all rules for all chains? Group of answer choices -F -D -R -C

-F

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server? Group of answer choices 23/tcp open telnet 993/tcp open imaps 22/tcp open ssh 443/tcp open https

23/tcp open telnet

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? Group of answer choices Configure /etc/fstab to mount the partition. Configure /etc/crypttab to mount the partition. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it.

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? Group of answer choices public DMZ trusted internal

DMZ

Which of the following does the -r option for the gpg command specify? Group of answer choices Encrypt for the user id given. Revoke keys from the key server. Remote key server to query. Retrieve keys for given key ID.

Encrypt for the user id given.

Which of the following are examples of multifactor authentication? Group of answer choices Password and PIN A USB token and a Common Access Card Thumbprint reader and facial recognition Password and fingerprint reader

Password and fingerprint reader

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command? Group of answer choices RSA and RSA RSA (sign only) DSA (sign only) RSA and Elgamal

RSA and RSA

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services? Group of answer choices NTP TACACS+ RADIUS SSH

TACACS+

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? Group of answer choices netfilter ufw TCP Wrapper iptables

TCP Wrapper

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? Group of answer choices Telnet Kerberos SyslogIncorrect. TFTP

Kerberos

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented? Group of answer choices Kerberos CUPS OTP Finger

OTP

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? Group of answer choices noop deadline cfq testwr

testwr


Related study sets

Med Surg. Gastrointestinal & Renal Care

View Set

4. Connective Tissue Cells: General & Fibroblasts

View Set

Chemical vs. Mechanical Digestion

View Set

CITI Trainings: RCR & Authorship

View Set

Chapter 2: Marketing Strategy (Company)

View Set

CISS 120 - Module 5: Number Systems

View Set

Chapter 8: Risk, Response, and Recovery

View Set