Which file contains the name servers to be used by the local machine for hostname resolution?
Answer : B
Which of the following practices is the most useful physical security requirement for a Linux server?
Answer : D
Which of the following is a correct entry in the /etc/hosts file?
Answer : B
You're planning the setup of a Linux computer as a server on your organization's network.
Which of the following is consistent with best practices for documentation?
Answer : A
What is the name of the file that contains encrypted hashes of passwords on a Linux system?
Answer : C
As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory.
Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?
Answer : C
On Linux systems, how can root logins be restricted?
Answer : D
How can you best see how much free space you have in your current directory?
Answer : B
Which of the following steps would not substantially improve security over the typical Linux installation to a computer with typical hardware and settings?
Answer : C
One of your users says that she changed her umask to 664, but now her new files all have a permission block of ---x--x-w-. If she wanted her new files to have a permission block of - rw-rw-r--, what should she have used as a umask?
Answer : B
Why is a log file analysis tool like Logcheck useful?
Answer : D
You've installed a new application on a test computer. During testing, you've run into a number of problems that you are unable to troubleshoot. Where should you look first for help?
Answer : B
Upon boot, the kernel starts init. What does init start next?
Answer : B
You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?
Answer : E
Assume you have forgotten the current superuser password for your Linux computer. On several Linux distributions, which of the following commands allows you to reset the root user password?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us