click below
click below
Normal Size Small Size show me how
Linux + Exam 2.5
| Question | Answer |
|---|---|
| Which command should you use to check the TCP wrapper configuration on your system? | tcpdchk |
| You are modifying the tcpd control files of the xinetd super daemon. Of the two tcpd control files, which file is applied first? | /etc/hosts.deny |
| Which command should you use to scan for open TCP ports on your Linux system? | nmap -sT |
| Which command should you use to display both listening and non-listening sockets on your linux system? | netstat -a |
| What chage command should you use to set the password for jsmith to expire after 60 days an gives a warning 10 days before it expires? | chage -M 60 -W 10 jsmith |
| You are now configuring the client to automatically provide the private key passphrase when needed so that you do not need to type the passphrase for every new SSH connection. Which command should you use in conjunction with the ssh-agent bash command? | ssh-add ~/.ssh/id_dsa |
| You believe your GnuPG key pair has been compromised and should no longer be used. What command should you use to create a key revocation certificate for the key-pair? | gpg --gen-revoke |
| Which file should you edit to configure the inetd super daemon? | /etc/inetd.conf |
| Which command should you use to edit the /etc/sudoers file? | visudo |
| Which utility should you use to encrypt emails, digitally sign emails and encrypt documents? | gpg |
| Which file should you edit to limit the amount of concurrent logins for a specific user? | /etc/security/limits.conf |
| Which ssh option should you use to set up an SSH tunnel for X server traffic? | ssh -X |
| You need to ID which user accounts on the system have encrypted passwords. Which character in the Password filed /etc/shadow file indicates an encrypted password is set for the user account? | $ |
| Which command will prevent the shell from using too much of the systems resources | ulimit |
| Which version of SSH supports both Rivest, Shamir Adleman (RSA) and Digital Signature Algorithm (DSA) encryption standards? | SSH2 |
| Which file should you create to disable the ability to log into a Linux system? | /etc/nologin |
| When using DSA to establish an SSH session, what is the name of the key that the SSH server will send to the client? | ssh_host_dsa_key.pub |
| You need to configure which commands may be used with the sudo command. Which file should you edit? | /etc/sudoers |
| You need to block all users from logging in to the system while you resolve some serious issues. You first need to force all active users to logout. Which command will display a list of all active users? | w |
| Which file should you edit to configure the SSH daemon on the server system? | /etc/ssh/sshd_config |