Linux - Chapter 14 Review Quiz

Ace your homework & exams now with Quizwiz!

True

12. The private key is used when creating a digital signature. a. True b. False

False

18. When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. ? a. True b. False

Delegate responsibility.

8. Which of the following steps is not a common troubleshooting procedure? a. Test the solution. b. Isolate the problem. c. Delegate responsibility. d. Collect information.

PortSentry Snort

Which of the following Linux intrusion detection systems can be used to detect port scans? a. AIDE b. PortSentry c. tripwire d. Snort

firewall cmd - -add-service s sh - -permanent

9. Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall —cmd — -add-service s sh b. firewall -cmd -add-port 22/tcp c. firewall -cmd - -add-port 22 /udp d. firewall cmd - -add-service s sh - -permanent

Ensure that only necessary services are running.

13. Which of the following actions should you first take to secure your Linux computer against network attacks? a. Change permissions on key system files. b. Ensure that only necessary services are running. c. Run a checksum for each file used by network services. d. Configure entries in the /etc/sudoers file.

Take 3 swap statistics every 50

14. What will the command sar —W 3 50 do ? a. Take 3 swap statistics every 50 seconds. b. Take 50 swap statistics every 3 seconds. c. Take 3 CPU statistics every 50 seconds. d. Take 50 CPU statistics every 3 seconds.

nmap

15. Which of the following commands can be used to scan the available ports on computers within your organization? a. traceroute b. tracert c. nmap d. sudo

mouse keys high contrast sticky keys on-screen keyboard

16. Which of the following are common assistive technologies? (Choose all that apply.) a. mouse keys b. high contrast c. sticky keys d. on-screen keyboard

AIDE tripwire

17. Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.) a. AIDE b. SWATCH c. tripwire d. Snort

check syslog, dmesg, fstab and fdisk /dev/sda6

What would you use to collect information when troubleshooting if the system was unable to mount the /home filesystem (/dev/sda6)?

/etc/sudoers

10. Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/su.cfg c. /etc/sudo.cfg d. /etc/sudoers

sa19

2. Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. 15 b. sa39 c. sa19 d. 00

True

6. RSA is a common symmetric encryption algorithm used by SSH and GPG. ? a. True b. False

bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

19. When performing a sar —u command, you notice that %idle is consistently 10 percent. Is this good or bad? a. good, because the processor should be idle more than 5 percent of the time b. good, because the processor is idle 90 percent of the time c. bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required d. bad, because the processor is idle 10 percent of the time and perhaps a new hard disk is required

/etc/resolv.conf

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? a. /etc/hosts b. /etc/host.conf c. /etc/resolve d. /etc/resolv.conf

AIDE tripwire

Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.) a. AIDE b. SWATCH c. tripwire d. Snort

Run rpm -V [software name] to check for missing files and check the missing shared libraries using the ldd software name

What would you use to collect information when troubleshooting a new database application the fails to start successfully?

Check the sound card driver using the lspci command and reinstall the drivers

What would you use to collect information when troubleshooting a new sound card in the Linux system, but is not listed within any sound utility?

Free Vmstat sar

4. Which of the following commands can be used to display memory statistics? (Choose all that apply.) a. Free b. sar c. vmstat d. iostat

ldd

5. Which command indicates the shared libraries required by a certain executable program? a. Idconfig b. ldd c. rpm —V d. s 1 conf i g

monitoring

1. On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. proactive maintenance c. reactive maintenance d. documentation

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

View output of dmesg command for missing driver and view contents of the /var/log/messages

What would you use to collect information when troubleshooting a CD-ROM device that worked previously with Linux but now does not respond to the mount command?

Check the network configuration tool, located in /etc/network/interface

What would you use to collect information when troubleshooting a network configuration utility that you installed but will not recognize any modems on the system?

ulimit

11. Which command can increase the number of file handles that programs can open in a shell? a. Idd b. ulimit c. Iba3 2 d. t

a. Lock the server in a server closet. c. Ensure that SELinux or AppArmor is used to protect key services.

20. What are best practices for securing a Linux server? (Choose all that apply.) a. Lock the server in a server closet. b. Ensure that you are logged in as the root user to the server at all times. c. Ensure that SELinux or AppArmor is used to protect key services. d. Set the default run level to 1 (Single User Mode).

False

3. The Ispci command can be used to isolate problems with X Windows. ? a. True b. False

INPUT

7. What type of iptables chain targets traffic that is destined for the local computer? a. INPUT b. ROUTE c. FORWARD d. OUTPUT


Related study sets

Agency Law: Insurance Applications

View Set

Comp Final Project (Viktoria Genova)

View Set

COMP10002 Foundations of Algorithms

View Set

Ch. 1 Success Clinical Chemistry (437 q.)

View Set

Equations and Angle Relationships

View Set