Exam 14: Troubleshooting, Performance, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.

Free
(True/False)
4.7/5
(40)
Correct Answer:
Verified

False

Performance problems are caused by hardware, not software.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

​On a system that is not using Systemd, what two log files contain information related to PAM?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B, C

How is the mpstat utility used? What information does it provide, and how can that information be interpreted?

(Essay)
4.8/5
(38)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​The connections that a program makes to files on a filesystem.

(Short Answer)
4.9/5
(24)

Select the iptables option that specifies the destination address of packets for a rule:

(Multiple Choice)
4.8/5
(39)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​A measure of normal system activity.

(Short Answer)
4.8/5
(32)

After downloading an installing any shared libraries, what should be done to ensure ​the list of shared library directories and the list of shared libraries are updated?

(Multiple Choice)
4.8/5
(30)

What utility in the sysstat package measures the flow of information to and from disk devices?​

(Multiple Choice)
4.8/5
(38)

When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.

(Short Answer)
4.9/5
(47)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​A software program that can be used to automatically authenticate users using their private key.

(Short Answer)
4.7/5
(32)

What option for the iptables command can be used to specify the default policy for a certain chain type?

(Multiple Choice)
4.7/5
(37)

​What two commands below can display memory information and swap usage?

(Multiple Choice)
4.8/5
(31)

What file contains the DSA public key in the /etc/ssh directory?

(Multiple Choice)
4.9/5
(42)

Select the option that, when used with the sar command, displays swap statistics:

(Multiple Choice)
4.8/5
(41)

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

(True/False)
4.9/5
(37)

Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.

(Short Answer)
4.7/5
(32)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​A command that can be used to scan ports on network computers.

(Short Answer)
4.8/5
(39)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​An attack in which a network service is altered in memory

(Short Answer)
4.9/5
(37)

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

(True/False)
4.7/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)