Exam 19: Securing Linux
Exam 1: Introduction to the Linux Operating System50 Questions
Exam 2: Installing Opensuse49 Questions
Exam 3: Managing Files and Directories50 Questions
Exam 4: Creating and Editing Files With Text Editors49 Questions
Exam 5: Creating Shell Scripts and Displaying File Contents48 Questions
Exam 6: Managing Data: Backup and Recovery Processes50 Questions
Exam 7: Managing Users and Groups49 Questions
Exam 8: Network Communications47 Questions
Exam 9: Installing Software Packages50 Questions
Exam 10: Apache Web Server50 Questions
Exam 11: Domain Name System50 Questions
Exam 12: Configuring a Mail Server50 Questions
Exam 13: Working With the Network File System50 Questions
Exam 14: Planning for a Linux Installation49 Questions
Exam 15: Linux File System Management and Administration50 Questions
Exam 16: Managing Resources in Linux50 Questions
Exam 17: Networking in a Linux Environment50 Questions
Exam 18: Using Samba for Interoperating Linux and Windows50 Questions
Exam 19: Securing Linux50 Questions
Exam 20: Advanced Linux Administration50 Questions
Select questions type
Match each statement with an item
-Allows users to share file system or directory structures over a network.
Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
E
____ attacks take place by guessing passwords and keys.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
____________________ (PAM) provides a centralized mechanism for authenticating services.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Pluggable Authentication Module
Broadcast packets are ____ packets sent to every computer on a network.
(Multiple Choice)
4.7/5
(41)
____ programs are hidden scripts embedded in seemingly legitimate programs that are authorized by the unsuspecting victims.
(Multiple Choice)
4.8/5
(42)
Basing access control on IP addresses rather than hostnames makes authentication faster because you don't have to resolve hostnames.
(True/False)
4.9/5
(39)
Permissions are granted or removed based on three types of users, ____.
(Multiple Choice)
4.9/5
(37)
What is the purpose of the Masquerading section of the YaST Firewall module?
(Essay)
4.8/5
(32)
Every computer contains a(n) ____ to send and receive data from other computers over a network.
(Multiple Choice)
4.8/5
(32)
____ is a protocol used to ensure that data transmitted to and from a remote computer is encrypted and secure.
(Multiple Choice)
4.9/5
(30)
Match each statement with an item
-Allows users to log in to remote computers and interact with them over a secure network connection.
(Multiple Choice)
4.9/5
(41)
Match each statement with an item
-Allows users to access a remote computer's command shell without entering a login password.
(Multiple Choice)
4.9/5
(45)
To enable or disable services, you can use the ____ module.
(Multiple Choice)
4.9/5
(32)
Which value in the /etc/pam.d/sshd file causes the entire stack to fail if the module's demands aren't met, but only after the entire stack has been processed?
(Multiple Choice)
4.9/5
(39)
Match each statement with an item
-Allows Windows systems to share files and printers with Linux systems.
(Multiple Choice)
4.8/5
(38)
When security vulnerabilities are detected in Linux, it's up to ____ to find a solution.
(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)