Richard Blum

CompTIA Linux+ Powered by Linux Professional Institute Study Guide


Скачать книгу

Set up host security ( Chapter 10 )

      ● Awareness of shadow passwords and how they work

      ● Turn off network services not in use

      ● Understand the role of TCP wrappers

      ● The following is a partial list of the files, terms, and utilities covered in this objective: /etc/nologin, /etc/passwd, /etc/shadow, /etc/xinetd.d/*, /etc/xinetd.conf, /etc/inetd.d/*, /etc/inetd.conf, /etc/inittab, /etc/init.d/*, /etc/hosts.allow, /etc/hosts.deny

      110.3 Securing data with encryption ( Chapter 10 )

      ● Perform basic OpenSSH 2 client configuration and usage

      ● Understand the role of OpenSSH 2 server host keys

      ● Perform basic GnuPG configuration and usage

      ● Understand SSH port tunnels (including X11 tunnels)

      ● The following is a partial list of the files, terms, and utilities covered in this objective: ssh, ssh-keygen, ssh-agent, ssh-add, ∼/.ssh/id_rsa and id_rsa.pub, ∼/.ssh/id_dsa and id_dsa.pub, /etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub, /etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub, ∼/.ssh/authorized_keys, /etc/ssh_known_hosts, gpg, ∼/.gnupg/*

      Assessment Test

      1. Which section in the X server configuration file defines the combination of monitors and video cards that you're using on your Linux system?

      A. Monitor

      B. Screen

      C. Modeline

      D. Device

      E. Module

      2. How can you tell whether your system is using inetd or xinetd as a super server? (Select two.)

      A. Type ps ax | grep inetd, and examine the output for signs of inetd or xinetd.

      B. Type superserver to see a report on which super server is running.

      C. Look for the /etc/inetd.conf file or /etc/xinetd.d subdirectory, which are signs of inetd or xinetd, respectively.

      D. Examine the /etc/inittab file to see which super server is launched by init, which is responsible for this task.

      E. Type netstat – a | grep inet and examine the output for signs of inetd or xinetd.

      3. How does the lpc utility for CUPS differ from its counterpart in BSD LPD and LPRng?

      A. The lpc utility is unique to CUPS; it doesn't ship with BSD LPD or LPRng.

      B. CUPS doesn't ship with an lpc command, but BSD LPD and LPRng do.

      C. CUPS's lpc is much more complex than its counterpart in BSD LPD and LPRng.

      D. CUPS's lpc is much simpler than its counterpart in BSD LPD and LPRng.

      E. The lpc utility is identical in all three of these printing systems.

      4. What file would you edit to restrict the number of simultaneous logins a user can employ?

      A. /etc/pam.d/login-limits

      B. /etc/bashrc

      C. /etc/security/limits.conf

      D. /etc/inittab

      E. /etc/passwd

      5. Which of the following are required when configuring a computer to use a static IP address? (Select two.)

      A. The IP address of the DHCP server

      B. The hostname of the NBNS server

      C. The computer's IP address

      D. The network mask

      E. The IP address of the NTP server

      6. What does the following command accomplish?

      A. It launches the wc editor on both the report.txt and wc.txt files; each file opens in its own window.

      B. It displays a count of the windows in which the report.txt file is displayed and shows that information in a new window called wc.

      C. It creates a count of newlines, words, and bytes in the report.txt file and then displays a count of these statistics about the report it just generated.

      D. It cleans up any memory leaks associated with the tee program's use of the report.txt file.

      E. It displays a count of newlines, words, and bytes in the report.txt file and copies that output to the wc file.

      7. Which of the following characters defines the end of an OS or kernel definition in /boot/grub/grub.cfg?

      A. ;

      B. )

      C. }

      D. */

      E. None of the above; the definition ends with the title line beginning the next entry.

      8. What does the number 703 represent in the following /etc/passwd entry?

      A. The account's human ID (HID) number

      B. The account's process ID (PID) number

      C. The account's group ID (GID) number

      D. The account's globally unique ID (GUID) number

      E. The account's user ID (UID) number

      9. What does the grep command accomplish?

      A. It creates a pipeline between two programs.

      B. It searches files' contents for a pattern.

      C. It concatenates two or more files.

      D. It displays the last several lines of a file.

      E. It locates files on the hard disk.

      10. Which of the following are journaling filesystems for Linux? (Select three.)

      A. vfat

      B. ReiserFS

      C. Ext2fs

      D. Ext3fs

      E. XFS

      11. You've configured your computer to use SMTP and IMAP via a tunneled SSH connection to your ISP's email server