Exam 14: Troubleshooting, Performance, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which command can be used to see what network services are running on your network?

(Multiple Choice)
4.8/5
(37)

What methods can be used to physically secure local computers?

(Essay)
4.9/5
(40)

What option can be specified with the rpm command to identify any missing files in a package or package dependency?

(Multiple Choice)
4.8/5
(37)

How can you identify filesystem corruption? How should you troubleshoot filesystem corruption on a non-critical partition?

(Essay)
4.7/5
(31)

​What are the two most common technologies that provide asymmetric encryption on Linux systems?

(Multiple Choice)
4.9/5
(40)

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:

(Multiple Choice)
4.7/5
(33)

What is the most common hardware component to fail on a Linux system?

(Multiple Choice)
4.9/5
(32)

Running background processes using what command allows you to exit your command-line shell without ending any background processes?

(Multiple Choice)
4.8/5
(42)

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?​

(Multiple Choice)
4.7/5
(37)

What are the two golden rules that should guide you during any troubleshooting process? Describe each rule.

(Essay)
4.8/5
(33)

What command can be used to change the maximum number of file handles that can be used by a program?​

(Multiple Choice)
4.8/5
(36)

​If X Windows fails to start, what command can be used to troubleshoot the issue?

(Multiple Choice)
4.9/5
(46)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.​

(Short Answer)
4.7/5
(45)

Which sar command option is used to display statistics for the processor queue?

(Multiple Choice)
4.8/5
(29)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -A common IDS for Linux that monitors files and directories.​

(Short Answer)
4.7/5
(21)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​A command that lists the files that are currently being viewed or modified by software programs and users.

(Short Answer)
4.9/5
(38)

How can netfilter/iptables be used to create a firewall service?

(Essay)
4.9/5
(45)

​Asymmetric encryption uses a pair of keys that are unique generated on each system. What are these two keys called?

(Multiple Choice)
4.8/5
(33)

If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?

(Multiple Choice)
4.7/5
(40)

​Match each term with the correct statement below. a.​baseline b.buffer overrun​ c.​file handles d.​firewall daemon (firewalld) e.​Intrusion Detection System (IDS) f.​lsof command g.​nmap command h.​SSH agent i.​tunneling j.tripwire -​A program that can be used to detect unauthorized access to a Linux system.

(Short Answer)
4.8/5
(42)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)