Linux Security Questions + Answers

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Linux Security Questions + Answers

Post by answerhappygod »

Question 1
Which of the following is true of Linux passwords?
A. They are changed with the password utility.
B. They must be changed once a month.
C. They may consist only of lowercase letters and numbers.
D. They may be changed by the user who owns an account or by root.


Answer : A

Question 2
Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password
Suite?
A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd


Answer : B

Question 3
Under the bash shell which is the most appropriate place to set environment variables that apply to all users?
A. /etc/skel
B. rc.sysinit
C. /etc/profile
D. /etc/bashrc
E. rc.local


Answer : A

Question 4
Which of the following measures is the most effective way to prevent attacks through various network services?
A. Disable a service in the appropriate /etc/xinetd.d configuration file.
B. Use a firewall to drop all requests to unneeded services.
C. Block service requests with the appropriate commands in /etc/hosts.deny.
D. Uninstall unneeded network services.


Answer : D

Question 5
Which of the following statements applies to the IP address 192.168.0.1?
A. It is reserved.
B. It cannot be assigned to a host that accesses the Internet.
C. It is designated for multicast transmission.
D. It can be freely assigned to a host on a private network


Answer : A


Question 11
Which statement describes the cron daemon?
A. Manages scheduling of routine system tasks
B. Manages all incoming connections and spawns off child processes
C. Is responsible for file sharing across a network
D. Keeps track of system messages and errors
E. Manages the printing subsystem


Answer : B

Question 12
You're using a communications protocol that cannot handle encrypted passwords.
You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the
/etc/shadow and /etc/gshadow files?
A. grpunconv; passunconv
B. grpunconv; pwunconv
C. gconv; passunconv
D. gconv; pwunconv


Answer : B

Question 13
What would the following command do?
cat MyFile | sort | tee | lpr
A. Print the contents of MyFile in alphabetical order and display the contents of MyFile in sorted order.
B. Print the contents of MyFile in alphabetical order and display the contents of MyFile.
C. It would not work because it contains too many pipes.
D. Print the contents of MyFile in alphabetical order.


Answer : A

Question 14
You inadvertently change the permission block on /usr/bin/passwd command to
-r-xr-xr-x.
What would be the effect of this change?
A. No changes in how the command runs would occur.
B. Users could no longer change their passwords because they do not have write permissions to /etc/passwd.
C. Users' passwords would not expire.
D. Shadow passwords would quit working.


Answer : B

Question 15
One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?
A. Someone is using your Web site to test their connectivity to the Internet.
B. Someone is using a DoS attack on your Web site.
C. There is no problem; this is normal traffic from DNS servers and Internet routers checking connectivity to your Web site.
D. There is insufficient capacity on the Internet connection to your Web site.


Answer : B


Question 16
When you look through the /var/log directory you see a new file, httpd.crit. Assume that it is a legitimate file, created for legitimate reasons. Which of the following statements is the best possible description of this file?
A. It contains error messages related to access to your Apache Web server.
B. It includes critical notices related to access through your router.
C. It contains critical information related to your Web access.
D. It includes critical messages about the actions taken by your Apache Web server.


Answer : B

Question 17
When you downloaded a kernel patch from the Internet, the name you clicked on was kernel-patch-2.4.4-66.i386.tar.gz. The file that was downloaded is kernel-patch-2.4.4-
66.i386.tgz. Which of the following commands will unarchive this patch from the /tmp directory?
A. tar cvf /tmp/kernel-patch-2.4.4-66.i386.tgz
B. tar xzf /tmp/kernel-patch-2.4.4-66.i386.tgz
C. tar czf /tmp/kernel-patch-2.4.4-66.i386.tgz
D. tar xvf /tmp/kernel-patch-2.4.4-66.i386.tgz


Answer : C

Question 18
Your supervisor tells you that she wants a crime database program, /opt/bin/anticrime run at the highest priority. From the ps aux | grep anticrime command, you find that anticrime is currently being run by user jb (your supervisor), with a PID of 1539. Which of the following commands gives the currently running anticrime program a higher priority on your system?
A. nice -n -10 anticrime
B. renice -10 1539
C. renice 10 1539
D. nice -n 10 anticrime


Answer : C

Question 19
What does the command "ps" do?
A. Prints the directory
B. Print status of LPT1
C. Shows what processes are running
D. Produces system statistics


Answer : C

Question 20
A user is logged into the Linux workstation, what is the best way to login to root from a shell prompt?
A. chuser root
B. root
C. login root
D. su


Answer : D


Question 21
You want to know how long each user's session was the last time they logged on.
Which of the following log files contains this information?
A. /var/log/utmp
B. /var/log/usrlog
C. /var/log/wtmp
D. /var/log/lastlog


Answer : D

Question 22
You want to allow Linux users running StarOffice to directly edit files stored on a
Windows 2000 SMB/CIFS file server. Which of the following would you use to enable this?
A. Linux's standard NFS file sharing support
B. The Linux smbclient program
C. An FTP server running on the Windows system
D. The Linux smbmount program


Answer : B

Question 23
Which of the following umask values will result in files with rw-r----- permissions?
A. 640
B. 022
C. 210
D. 027


Answer : A

Question 24
You add the following line to the /etc/passwd file mary12250Mary

Jones/home/mary/bin/bash a -
and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?
A. You did not assign a valid password to Mary's account.
B. You did not set the appropriate permissions to her home directory.
C. You did not create her home directory.
D. You cannot create a new user account by manually editing the /etc/passwd file.


Answer : C

Question 25
Which of the following types of information is returned by typing ifconfig eth0?
(Choose two)
A. The names of programs that are using eth0
B. The IP address assigned to eth0
C. The hardware address of eth0
D. The hostname associated with eth0


Answer : B,D
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply