Pre-Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

212-77 Sample Questions Answers

Questions 4

You inadvertently change the permission block on /usr/bin/passwd command to

-r-xr-xr-x.

What would be the effect of this change?

Options:

A.

No changes in how the command runs would occur.

B.

Users could no longer change their passwords because they do not have write permissions to /etc/passwd.

C.

Users' passwords would not expire.

D.

Shadow passwords would quit working.

Buy Now
Questions 5

Which of the following measures is the most effective way to prevent attacks through various network services?

Options:

A.

Disable a service in the appropriate /etc/xinetd.d configuration file.

B.

Use a firewall to drop all requests to unneeded services.

C.

Block service requests with the appropriate commands in /etc/hosts.deny.

D.

Uninstall unneeded network services.

Buy Now
Questions 6

server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP Wrappers runs?

Options:

A.

hosts.deny takes precedence; the client is denied access to the server.

B.

hosts.allow takes precedence; the client is granted access to the server.

C.

The system's administrator is paged to decide whether to allow access.

D.

TCP Wrappers refuses to run and logs an error in /var/log/messages.

Buy Now
Questions 7

An irreparably corrupt ext2 filesystem requires running

Options:

A.

fdisk

B.

mkfs

C.

newfs

D.

fsck

Buy Now
Questions 8

A computer is chained firmly to the wall, all of its accounts are secured with good shadowed passwords, and it's configured to boot only from its hard disk, but the system has no BIOS or boot loader password. No users are currently logged into this system. How might a malicious individual without an account on this system corrupt it if given a few minutes alone with it? (Choose two)

Options:

A.

The intruder could reboot it, reconfigure it to boot from floppy, boot a DOS floppy, and use DOS's disk utilities to delete the Linux partitions and erase the hard disk.

B.

The intruder could open the case, remove the hard disk and insert it in another computer, then modify the configuration files and return the hard disk to the original machine.

C.

The intruder could run a password-cracking program on the system's /etc/passwd file, thus obtaining all the user's passwords for use in further compromising the system at a later date.

D.

The intruder could utilize a bug in su, passwd, or some other SUID root program to acquire root privileges and then alter the system's configuration files.

Buy Now
Questions 9

How can you best see how much free space you have in your current directory?

Options:

A.

Use du .

B.

Use df .

C.

Use du /

D.

Use df

E.

Use df /

Buy Now
Questions 10

Which command creates a file system in Linux?

Options:

A.

CRFS

B.

FS

C.

FDISK

D.

MKFS

Buy Now
Questions 11

You've installed a new application on a test computer. During testing, you've run into a number of problems that you are unable to troubleshoot. Where should you look first for help?

Options:

A.

Before doing anything else, install the application on a production computer and see if you still have the same problems.

B.

The log files associated with the application.

C.

The Web site home page for the application.

D.

Newsgroups where other users discuss the application.

Buy Now
Questions 12

You're planning the setup of a Linux computer as a server on your organization's network. Which of the following is consistent with best practices for documentation?

Options:

A.

Keep a copy of each user's password in a locked filing cabinet in the same room as the Linux server.

B.

Record the inode number of every file in a binder in the same room as the Linux server.

C.

Record the hardware configuration details in a binder in the same room as the Linux server.

D.

Keep a copy of key configuration files on a different partition on the same computer.

Buy Now
Questions 13

You think that someone has been attempting to hack into your system by attacking your /etc/passwd file. What can you do to increase the security of your system?

Options:

A.

Change all the passwords in the /etc/passwd file to x.

B.

Implement shadow passwords using the spasswd command.

C.

Change all the passwords in the /etc/passwd file to *.

D.

Implement shadow passwords using the pwconv command.

Buy Now
Questions 14

Which of the following are risks of SUID and SGID programs? (Choose two)

Options:

A.

Bugs in the programs may cause more damage than they would in ordinary programs.

B.

The program files are large and thus may cause a disk to run out of space.

C.

Because the programs require password entry, running them over an insecure network link runs the risk of password interception.

D.

Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible.

Buy Now
Questions 15

What is the name of the file that contains encrypted hashes of passwords on a Linux system?

Options:

A.

/etc/shadow

B.

/etc/.passwd

C.

/etc/passwd

D.

/.secure/.htaccess

Buy Now
Exam Code: 212-77
Exam Name: Linux Security
Last Update: Oct 7, 2024
Questions: 51
$64  $159.99
$48  $119.99
$40  $99.99
buy now 212-77