101-2 Flashcards
(117 cards)
What is true regarding public and private SSH keys? (Choose two.)
A. For each user account, there is exactly one key pair that can be used to log into that account.
B. The private key must never be revealed to anyone.
C. Several different public keys may be generated for the same private key.
D. To maintain the private key’s confidentiality, the SSH key pair must be created by its owner.
E. To allow remote logins, the user’s private key must be copied to the remote server.
B. The private key must never be revealed to anyone.
D. To maintain the private key’s confidentiality, the SSH key pair must be created by its owner.
Which of the following commands finds all files owned by root that have the SetUID bit set?
A. find / -user root -perm -4000
B. find / -user 0 -mode +s
C. find / -owner root -setuid
D. find / -owner 0 -permbits 0x100000000
E. find / –filter uid=1 –filter pers=u+s
A. find / -user root -perm -4000
What command is used to add OpenSSH private keys to a running ssh-agent instance?
ssh-add
Which directory holds configuration files for xinetd services? (full path to the directory.)
/etc/xinetd.d/
Which mechanism does ssh use to interact with the SSH agent?
A. Connecting to port 2222 which is used by the system-wide SSH agent.
B. Using the fixed socket .ssh-agent/ipc.
C. Creating an alias replacing ssh with calls to ssh-agent.
D. Starting ssh-agent as a child process for each ssh invocation.
E. Evaluating environment variables such as SSH_AUTH_SOCK.
E. Evaluating environment variables such as SSH_AUTH_SOCK.
Which parameter of the ssh command specifies the location of the private key used for login attempts?
(Specify only the option name without any values or parameters.)
-i
Which of the following is true about IPv6?
A. IPv6 no longer supports broadcast addresses.
B. With IPv6, the TCP port numbers of most services have changed.
C. IPv4 addresses can be used without any change with IPv6.
D. IPv6 no longer supports multicast addresses.
E. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.
A. IPv6 no longer supports broadcast addresses.
What is true about the following command?
nmcli device wifi connect WIFIoI
A. NetworkManager opens a new public hotspot with the SSID WIFIoI.
B. NetworkManager creates an unconfigured new virtual network interface named WIFIoI.
C. NetworkManager creates a new wifi connection WIFIoI and activates it.
D. NetworkManager returns an error in case the connection WIFIoI does not exist.
E. NetworkManager returns an error because WIFIoI is an invalid wifi device.
C. NetworkManager creates a new wifi connection WIFIoI and activates it.
Which of the commands below might have produced the following output?
;; global options: +cmd
;; Got answer:
;; -»HEADER«- opcode: QUERY, status: NOERROR, id: 14368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QuESTION SECTION:
;www.example.org. IN NS
;; AUTHORITY SECTION:
example.org. 3600 IN SOA ns.icann.org. noc.dns.icann.org. 2019121418 7200 3600 1209600 3600
;; Query time: 96 msec
;; SERVER: 172.21.0.9#53(172.21.0.9)
;; WHEN: Di Jun 23 13:57:34 CEST 2020
;; MSG SIZE rcvd: 97
A. dig -t mx www.example.org
B. dig www.example.org
C. dig -t ns www.example.org
D. dig -t a www.example.org
E. dig -t soa www.example.org
C. dig -t ns www.example.org
Which parameter is missing in the command
ip link set ____ dev eth0
to activate the previously inactive network interface eth0? (Specify the parameter only without any
command, path or additional options.)
up
Which of the following states can NetworkManager show regarding the system’s network connectivity? (Choose two.)
A. up
B. portal
C. full
D. login-required
E. firewalled
B. portal
C. full
Which of the following are valid host addresses for the subnet 203.0.113.64/28? (Choose two.)
A. 203.0.113.64
B. 203.0.113.78
C. 203.0.113.65
D. 203.0.113.80
E. 203.0.113.81
B. 203.0.113.78
C. 203.0.113.65
Which of the following keywords can be used in the file /etc/resolv.conf? (Choose two.)
A. substitute
B. lookup
C. search
D. nameserver
E. method
C. search
D. nameserver
How does the ping command work by default?
A. Is sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return.
B. It sends an ARP request to a remote host and waits to receive an ARP response in return.
C. It sends a TCP SYN packet to a remote host and waits to receive an TCP ACK response in return.
D. Is sends a broadcast packet to all hosts on the net and waits to receive, among others, a response from the target system.
E. It sends a UDP packet to port 0 of the remote host and waits to receive a UDP error response in return.
A. Is sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return.
Which of the following commands displays the number of bytes transmitted and received via the eth0 network interface? (Choose two.)
A. route -v via eth0
B. ip stats show dev eth0
C. netstat -s -i eth0
D. ifconfig eth0
E. ip -s link show eth0
D. ifconfig eth0
E. ip -s link show eth0
Given the following routing table:
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.178.1 0.0.0.0 UG 0 0 0 wlan0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
192.168.2.0 192.168.1.1 255.255.255.0 U 0 0 0 eth0
192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0
How would an outgoing packet to the destination 192.168.2.150 be handled?
A. It would be passed to the default router 192.168.178.1 on wlan0.
B. It would be directly transmitted on the device eth0.
C. It would be passed to the default router 255.255.255.0 on eth0.
D. It would be passed to the router 192.168.1.1 on eth0.
E. It would be directly transmitted on the device wlan0.
D. It would be passed to the router 192.168.1.1 on eth0.
Which of the following commands will delete the default gateway from the system’s IP routing table?
(Choose two.)
A. ifconfig unset default
B. route del default
C. ip route del default
D. netstat -r default
E. sysctl ipv4.default_gw=0
B. route del default
C. ip route del default
What command enables a network interface according to distribution-specific configuration, such as
/etc/network/interfaces
or
/etc/sysconfig/network-scripts/ifcfg-eth0?
ifup
What is true about NetworkManager on a Linux system that uses its distribution’s mechanisms to configure network interfaces? (Choose two.)
A. NetworkManager reconfigures all network interfaces to use DHCP unless they are specifically managed by NetworkManager.
B. NetworkManager must be explicitly enabled for each interface it should manage.
C. NetworkManager by default does not change interfaces which are already configured.
D. NetworkManager disables all interfaces which were not configured by NetworkManager.
E. NetworkManager can be configured to use the distribution’s network interface configuration.
C. NetworkManager by default does not change interfaces which are already configured.
E. NetworkManager can be configured to use the distribution’s network interface configuration.
Which standardized TCP port is used by HTTPS services?
A. 25
B. 80
C. 8080
D. 443
E. 636
D. 443
Which of the following environment variables can be defined in locale.conf? (Choose two.)
A. LC_ALL
B. LC_USERNAME
C. LC_UTF8
D. LC_GEOGRAPHY
E. LC_TIME
A. LC_ALL
E. LC_TIME
Which of the following commands sets the system’s time zone to the Canadian Eastern Time?
A. localegen -t -f /usr/share/zoneinfo/Canada/Eastern > /etc/locate.tz
B. tzconf /etc/localtime
C. sysctl -w clock.tz=’Canada/Eastern’
D. modprobe tz_ca_est
E. ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime
E. ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime
What option to useradd creates a new user’s home directory and provisions it with a set of standard files?
(Specify only the option name without any values or parameters.)
-m
How can a specific user be prevented from scheduling tasks with at?
A. By adding the specific user to the /etc/at.allow file.
B. By adding the specific user to the [deny] section in the /etc/atd.conf file.
C. By adding the specific user to the nojobs group.
D. By adding the specific user to the /etc/at.deny file.
E. By executing the atd –deny [user] command.
D. By adding the specific user to the /etc/at.deny file.