Awareness of shadow passwords and how they work
● Turn off network services not in use
● Understand the role of TCP wrappers
● The following is a partial list of the files, terms, and utilities covered in this objective: /etc/nologin
, /etc/passwd
, /etc/shadow
, /etc/xinetd.d/*
, /etc/xinetd.conf
, /etc/inetd.d/*
, /etc/inetd.conf
, /etc/inittab
, /etc/init.d/*
, /etc/hosts.allow
, /etc/hosts.deny
110.3 Securing data with encryption ( Chapter 10 )
● Perform basic OpenSSH 2 client configuration and usage
● Understand the role of OpenSSH 2 server host keys
● Perform basic GnuPG configuration and usage
● Understand SSH port tunnels (including X11 tunnels)
● The following is a partial list of the files, terms, and utilities covered in this objective: ssh
, ssh-keygen
, ssh-agent
, ssh-add
, ∼/.ssh/id_rsa
and id_rsa.pub
, ∼/.ssh/id_dsa
and id_dsa.pub
, /etc/ssh/ssh_host_rsa_key
and ssh_host_rsa_key.pub
, /etc/ssh/ssh_host_dsa_key
and ssh_host_dsa_key.pub
, ∼/.ssh/authorized_keys
, /etc/ssh_known_hosts
, gpg
, ∼/.gnupg/*
Assessment Test
1. Which section in the X server configuration file defines the combination of monitors and video cards that you're using on your Linux system?
A. Monitor
B. Screen
C. Modeline
D. Device
E. Module
2. How can you tell whether your system is using inetd
or xinetd
as a super server? (Select two.)
A. Type ps ax | grep inetd, and examine the output for signs of inetd
or xinetd
.
B. Type superserver to see a report on which super server is running.
C. Look for the /etc/inetd.conf
file or /etc/xinetd.d
subdirectory, which are signs of inetd
or xinetd
, respectively.
D. Examine the /etc/inittab
file to see which super server is launched by init
, which is responsible for this task.
E. Type netstat – a | grep inet and examine the output for signs of inetd
or xinetd
.
3. How does the lpc
utility for CUPS differ from its counterpart in BSD LPD and LPRng?
A. The lpc
utility is unique to CUPS; it doesn't ship with BSD LPD or LPRng.
B. CUPS doesn't ship with an lpc
command, but BSD LPD and LPRng do.
C. CUPS's lpc
is much more complex than its counterpart in BSD LPD and LPRng.
D. CUPS's lpc
is much simpler than its counterpart in BSD LPD and LPRng.
E. The lpc
utility is identical in all three of these printing systems.
4. What file would you edit to restrict the number of simultaneous logins a user can employ?
A. /etc/pam.d/login-limits
B. /etc/bashrc
C. /etc/security/limits.conf
D. /etc/inittab
E. /etc/passwd
5. Which of the following are required when configuring a computer to use a static IP address? (Select two.)
A. The IP address of the DHCP server
B. The hostname of the NBNS server
C. The computer's IP address
D. The network mask
E. The IP address of the NTP server
6. What does the following command accomplish?
A. It launches the wc
editor on both the report.txt
and wc.txt
files; each file opens in its own window.
B. It displays a count of the windows in which the report.txt
file is displayed and shows that information in a new window called wc
.
C. It creates a count of newlines, words, and bytes in the report.txt
file and then displays a count of these statistics about the report it just generated.
D. It cleans up any memory leaks associated with the tee
program's use of the report.txt
file.
E. It displays a count of newlines, words, and bytes in the report.txt
file and copies that output to the wc
file.
7. Which of the following characters defines the end of an OS or kernel definition in /boot/grub/grub.cfg
?
A. ;
B. )
C. }
D. */
E. None of the above; the definition ends with the title
line beginning the next entry.
8. What does the number 703
represent in the following /etc/passwd
entry?
A. The account's human ID (HID) number
B. The account's process ID (PID) number
C. The account's group ID (GID) number
D. The account's globally unique ID (GUID) number
E. The account's user ID (UID) number
9. What does the grep
command accomplish?
A. It creates a pipeline between two programs.
B. It searches files' contents for a pattern.
C. It concatenates two or more files.
D. It displays the last several lines of a file.
E. It locates files on the hard disk.
10. Which of the following are journaling filesystems for Linux? (Select three.)
A. vfat
B. ReiserFS
C. Ext2fs
D. Ext3fs
E. XFS
11. You've configured your computer to use SMTP and IMAP via a tunneled SSH connection to your ISP's email server for improved security.