Martin Covill
Quiz by , created more than 1 year ago

Sec Ops Linux Quiz

28
0
0
Martin Covill
Created by Martin Covill over 8 years ago
Close

Sec Ops Linux Quiz

Question 1 of 23

1

Which of the following statements would create a default route using a gateway of
192.168.1.1?

Select one of the following:

  • A. netstat -add default gw

  • B. route default 192.168.1.1

  • C. ip route default 192.168.1.1

  • D. route add default gw 192.168.1.1

  • E. ifconfig default gw 192.168.1.1 eth0

Explanation

Question 2 of 23

1

Which of the following is the purpose of the dig command?

Select one of the following:

  • A. To adjust a directory’s hidden permissions

  • B. To search for files on the filesystem

  • C. To adjust a file’s hidden permissions

  • D. To perform hostname lookups

  • E. To ping all known hosts on the current subnet

Explanation

Question 3 of 23

1

Which of the following configuration files does sudo read when determining if a user is
permitted to run applications with root privileges?

Select one of the following:

  • A. /etc/groups

  • B. /etc/passwd

  • C. /etc/sudoers

  • D. /etc/sudo.conf

Explanation

Question 4 of 23

1

The files in the /etc/skel directory are used by the:

Select one of the following:

  • A. pwconv command

  • B. pwunconv command

  • C. useradd command

  • D. passwd command

Explanation

Question 5 of 23

1

Fill the blank space to complete the text.

The protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer?
(Please do not enter duplicate answers in this field.)

Explanation

Question 6 of 23

2

Which of the following statements about crontab are true? (Select TWO).

Select one or more of the following:

  • A. Every user may have their owncrontab.

  • B. Changing a crontab requires a reload/restart of the cron daemon.

  • C. The cron daemon reloads crontab files automatically when necessary.

  • D. hourly is the same as “0 * * * *”.

  • E. A cron daemon must run for each existing crontab.

Explanation

Question 7 of 23

1

Which of the following commands is used to deactivate a network interface?

Select one of the following:

  • A. ifdown

  • B. ipdown

  • C. net

  • D. netdown

Explanation

Question 8 of 23

1

Which of the following looks like a correct entry in the /etc/hosts file?

Select one of the following:

  • A. localhost 127.0.0.1 localhost.localdomain

  • B. localhost.localdomainlocalhost 127.0.0.1

  • C. localhostlocalhost.localdomain 127.0.0.1

  • D. 127.0.0.1 localhost.localdomainlocalhost

  • E. localhost.localdomain 127.0.0.1 localhost

Explanation

Question 9 of 23

1

Which of the following lines would an administrator find in the file /etc/resolv.conf?

Select one of the following:

  • A. mycompany.com

  • B. 192.168.168.4 dns-server

  • C. hosts: files,dns

  • D. domain mycompany.com

Explanation

Question 10 of 23

1

Which of the following commands will provide locale-specific information about a system and its environment?

Select one of the following:

  • A. loconfig

  • B. getlocale

  • C. locale

  • D. tzconfig

  • E. tzselect

Explanation

Question 11 of 23

1

Which of the following should the permission settings be for /etc/passwd and /etc/shadow?

Select one of the following:

  • A. /etc/passwd: -rw-r–r– /etc/shadow: -r——–

  • B. /etc/passwd: -r——– /etc/shadow: -rw-r–r–

  • C. /etc/passwd: -rw-r–r– /etc/shadow: -rw-r–r–

  • D. /etc/passwd: -r——– /etc/shadow: -r——–}

Explanation

Question 12 of 23

1

Suppose that the command netstat -a hangs for a long time without producing output. An
administrator might suspect:

Select one of the following:

  • A. a problem with NFS

  • B. a problem with DNS

  • C. a problem with NIS

  • D. a problem with routing

  • E. that the netstat daemon has crashed

Explanation

Question 13 of 23

1

Which of the following describes the Linux ping packet or datagram?

Select one of the following:

  • A. IP packet with a packet type

  • B. ICMP packet with a message type

  • C. ICMP packet with a payload

  • D. UDP datagram with a protocol type

  • E. UDP datagram with a payload

Explanation

Question 14 of 23

1

Which of the following commands would an administrator use to create an OpenSSH
authentication key?

Select one of the following:

  • A. sshd

  • B. ssh-agent

  • C. ssh-keygen

  • D. ssh-add

Explanation

Question 15 of 23

2

Which of the following Class B IPv4 networks are reserved by IANA for private address
assignment and private routing? (Select TWO).

Select one or more of the following:

  • A. 128.0.0.0

  • B. 169.16.0.0

  • C. 169.254.0.0

  • D. 172.16.0.0

  • E. 172.20.0.0

Explanation

Question 16 of 23

1

Fill the blank space to complete the text.

The IP protocol is connectionless and unreliable? (Please enter only a single answer and
do not enter duplicate answers in this field.)

Explanation

Question 17 of 23

1

Which of the following commands can be used to activate a specific network interface?

Select one of the following:

  • A. ipup

  • B. net

  • C. ifup

  • D. netup

Explanation

Question 18 of 23

1

What are the three sets of permissions for a file?

Select one of the following:

  • A. user, group, others

  • B. administrator, group, others

  • C. user, standard user, others

  • D. administrator, standard user, others

Explanation

Question 19 of 23

1

Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home?

Select one of the following:

  • A. tar /home backup.tar

  • B. tar -cf /home backup.tar

  • C. tar -xf /home backup.tar

  • D. tar -xf backup.tar /home

  • E. tar -cf backup.tar /home

Explanation

Question 20 of 23

1

What command would you use to get comprehensive documentation about any command in Linux?

Select one of the following:

  • A. help command

  • B. echo command

  • C. locate command

  • D. man command

  • E. get command

Explanation

Question 21 of 23

1

Which command will display running process information in real time?

Select one of the following:

  • A. top

  • B. show current

  • C. ps current

  • D. process

Explanation

Question 22 of 23

1

What is the command to change the password of a user?

Select one of the following:

  • A. wpasswd

  • B. gpasswd

  • C. epasswd

  • D. passwd

  • E. password

Explanation

Question 23 of 23

1

With which command can you determine the time of the last restart of a system?

Select one of the following:

  • A. current reboottime

  • B. find reboot

  • C. expect –reboot

  • D. last | reboot

  • E. last reboot

Explanation