Linux 102 Flashcards

1
Q
QUESTION NO: 1
The legacy program for sending files to the printer queues from the command line is which of the following?
A. lpd
B. lpr
C. lpq
D. lpp
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following statements would create a default route using a gateway of 192.168.1.1?
A. netstat -add default gw
B. route default 192.168.1.1
C. ip route default 192.168.1.1
D. route add default gw 192.168.1.1
E. ifconfig default gw 192.168.1.1 eth0
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 3
Which of the following is the purpose of the dig command?
A. To adjust a directory’s hidden permissions
B. To search for files on the filesystem
C. To adjust a file’s hidden permissions
D. To perform hostname lookups
E. To ping all known hosts on the current subnet

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following configuration files does sudo read when determining if a user is permitted to run applications with root privileges?
A. /etc/groups
B. /etc/passwd
C. /etc/sudoers
D. /etc/sudo.conf
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following commands will set the local machine’s timezone to UTC?
A. cat UTC > /etc/timezone
B. ln -s /usr/share/zoneinfo/UTC /etc/localtime
C. date –timezone=UTC
D. mv /usr/timezone/UTC /etc

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file).

A

/etc/cron.allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following commands should be added to /etc/bash_profile to change the language of messages from an internationalised program to Portuguese (pt)? (Select TWO).
A. export LANGUAGE="pt"
B. export MESSAGE="pt"
C. export LANG="pt"
D. export LC_MESSAGES="pt"
E. export ALL_MESSAGES="pt"
A

C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is pool.ntp.org?
A. A deprecated feature for maintaining system time in the Linux kernel.
B. A website which provides binary and source packages for the OpenNTPD project.
C. A virtual cluster of various timeservers.
D. A community website used to discuss the localization of Linux.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following directories in a user's home contains configuration files and key rings for GPG?
A. ~/gpg.d/
B. ~/.gpg/
C. ~/.gnupg/
D. ~/gnupg/
E. ~/.gpg.d/
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following lines from /etc/X11/xorg.conf indicates that fonts can be found on a font server?
A. FontPath= server
B. Fonts "unix/:7100"
C. FontPath "unix/:7100"
D. Fonts= server
E. Fontserver = "servername"
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
The files in the /etc/skel directory are used by the:
A. pwconv command
B. pwunconv command
C. useradd command
D. passwd command
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following SQL statements will select the fields name and address from the contacts table?
A. SELECT (name, address) FROM contacts;
B. SELECT (name address) FROM contacts;
C. SELECT name, address FROM contacts;
D. SELECT name address FROM contacts;
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following configuration files would an administrator edit to change default options for outbound ssh sessions?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/client
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_client
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following bash option will prevent an administrator from overwriting a file with a ">"?
A. set -o safe
B. set -o noglob
C. set -o noclobber
D. set -o append
E. set -o nooverwrite
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An ISP has given an administrator an IP block for use. The block is 192.168.112.64/26. If the
administrator uses the first usable IP for the router that is installed on the network, how many
usable IPs are left? (Please enter the number and not a word)

A

61

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
All of the following are Mail Transport Agents EXCEPT:
A. exim
B. postfix
C. sendmail
D. qmail
E. mail
A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An administrator is configuring a secured webserver, however connecting to https://127.0.0.1 is not working. The administrator runs netstat -ntl, which returns the following output: tcp 0 0
0.0.0.0:80 0.0.0.0:* LISTEN What port should be listening before a successful connection is
possible? (Provide only the numerical value of the port).

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer? (Please do
not enter duplicate answers in this field.)

A

ftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An administrator can run the ________ command to see active network and UNIX domain socket connections. (Please specify the command with no options or parameters).

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An administrator needs to sync the hardware clock, which is on GMT, with the system clock, which the administrator just updated with NTP. To do this, complete the following command: ________ -
u –systohc

A

hwclock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?
A. tcpd
B. inetd
C. fingerd
D. mountd
E. xinetd
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An administrator has added the following line to /etc/inittab in order to disable the ability to reboot a Debian system by pressing the Control + Alt + Delete keys simultaneously:
ca:12345:_________:/bin/echo “Rebooting disabled” Please provide the missing string.

A

ctrlaltdel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What word will complete an if statement in bash such as the following: if [ -x “$file” ]; then echo $file _____ (Please provide the missing word only).

A

fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An administrator decides to use xinetd instead of inetd. Now, the administrator needs to transfer information from /etc/inetd.conf to another file. What file must be created or edited? (Please specify the full path).

A

/etc/xinetd.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In the following command and its output, echo $$ 12942 which of the following is 12942?
A. The process ID of the echo command.
B. The process ID of the current shell.
C. The process ID of the last command executed.
D. The process ID of the last backgrounded command.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Which of the following commands will print the exit value of the previous command to the screen in bash?
A. echo $?
B. echo $#
C. echo $exit
D. echo $status
E. echo $&}
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements about crontab are true? (Select TWO).
A. Every user may have their own crontab.
B. Changing a crontab requires a reload/restart of the cron daemon.
C. The cron daemon reloads crontab files automatically when necessary.
D. hourly is the same as “0 * * * *”.
E. A cron daemon must run for each existing crontab.

A

A, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An administrator wants to determine the geometry of a particular window in X, so the administrator
issues the __________ -metric command and then clicks on the window. (Please enter only a
single command and do not enter duplicate answers in this field.)

A

xwininfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The command __________ prints a list of email that is currently in the queue waiting for delivery. (Please specify the command with or without path or arguments)

A

mailq

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

To slave the NTP daemon to an external source, an administrator needs to modify the ______ variable in the /etc/ntp.conf file.

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Which of the following commands is used to deactivate a network interface?
A. ifdown
B. ipdown
C. net
D. netdown
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following looks like a correct entry in the /etc/hosts file?
A. localhost 127.0.0.1 localhost.localdomain
B. localhost.localdomain localhost 127.0.0.1
C. localhost localhost.localdomain 127.0.0.1
D. 127.0.0.1 localhost.localdomain localhost
E. localhost.localdomain 127.0.0.1 localhost

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Which of the following lines would an administrator find in the file /etc/resolv.conf?
A. order hosts,bind
B. 192.168.168.4 dns-server
C. hosts: files,dns
D. domain mycompany.com
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following find commands will print out a list of suid root files in /usr?
A. find /usr -uid 0 -perm +4000
B. find -user root +mode +s /usr
C. find -type suid -username root -d /usr
D. find /usr -ls *s* -u root
E. find /usr -suid -perm +4000

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Which of the following commands will provide locale-specific information about a system and its environment?
A. loconfig
B. getlocale
C. locale
D. tzconfig
E. tzselect
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following should the permission settings be for /etc/passwd and /etc/shadow?
A. /etc/passwd: -rw-r–r– /etc/shadow: -r——–
B. /etc/passwd: -r——– /etc/shadow: -rw-r–r–
C. /etc/passwd: -rw-r–r– /etc/shadow: -rw-r–r–
D. /etc/passwd: -r——– /etc/shadow: -r——–}

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which of the following configuration files should be modified to set default shell variables for all users?
A. /etc/bashrc
B. /etc/profile
C. ~default/.bash_profile
D. /etc/skel/.bashrc
E. /etc/skel/.bash_profile
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

By default, which directories contents will be copied to a new user’s home directory when the account is created, passing the -m option to the useradd command?

A

/etc/skel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Suppose that the command netstat -a hangs for a long time without producing output. An administrator might suspect:
A. a problem with NFS
B. a problem with DNS
C. a problem with NIS
D. a problem with routing
E. that the netstat daemon has crashed
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Please specify the directory containing the configuration files for the CUPS printing system. (Provide the full path to the directory).

A

/etc/cups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following statements are true regarding the below syslog.conf configuration directive? (Select THREE) *.err;kern.notice;auth.notice /dev/console
A. Severity crit messages from all facilities will be directed to /dev/console
B. Severity notice messages from the auth facility will be directed to /dev/console
C. Severity notice messages from the kern facility will be directed to /dev/console
D. Severity err messages from the mail facility will be directed /dev/console
E. Severity notice messages from all facilities will be directed to /dev/console

A

B, C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
On a system running the K Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?
A. When KDM starts
B. When a user's X session exists
C. When KDM crashes
D. When X is restarted
E. When X crashes
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following is the BEST way to temporarily suspend a user’s ability to interactively login?
A. Changing the user’s UID.
B. Changing the user’s password.
C. Changing the user’s shell to /bin/false.
D. Removing the user’s entry in /etc/passwd.
E. Placing the command logout in the user’s profile.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
To test a shell script called myscript, the environment variable FOOBAR must be removed temporarily. How can this be done?
A. unset -v FOOBAR
B. set -a FOOBAR=""
C. env -u FOOBAR myscript
D. env -i FOOBAR myscript
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
Which of the following commands is used to display user resource limits?
A. uname
B. limit -a
C. usrlmt
D. ulimit
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
Which of the following lines would an administrator find in the file /etc/nsswitch.conf?
A. order hosts,bind
B. 192.168.168.4 dns-server
C. hosts: files dns
D. domain mycompany.com
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Which of the following commands can an administrator use to change a user's password expiry information? (Select THREE).
A. usermod
B. passwd
C. chattr
D. chage
E. chsh
A

A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following statements is true regarding the below /etc/resolv.conf file? search example.com 127.0.0.1 208.77.188.166
A. There is a syntax error.
B. If DNS queries to the localhost fail, the server 208.77.188.166 will be queried.
C. example.com will be appended to all host lookups.
D. The DNS servers at 127.0.0.1 and 208.77.188.166 will be queried in a round robin fashion.
E. The DNS server with the shortest ping time will be queried first. If the lookup fails, the second
server will be queried.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following crontab entries could be used to set the system time at regular intervals?
A. 1 0 * * * date $d $t $24
B. 1 0 * * * settime $d $t $24
C. 1 0 * * * date /dev/null 2>&1

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
Which of the following outputs will the below command produce? seq 1 5 20
A. 1
6
11
16
B. 1
5
10
15
C. 1
2
3
4
D. 2
3
4
5
E. 5
10
15
20
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When using ssh, which of the following can an administrator do to recover a lost passphrase for a DSA or RSA authentication key?
A. Run the ssh-keygen command.
B. Run the ssh –recover command.
C. A lost passphrase cannot be recovered.
D. Decrypt the authentication key with gpg.
E. Decrypt the authentication key with ssh –decrypt.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
Which of the following describes the Linux ping packet or datagram?
A. IP packet with a packet type
B. ICMP packet with a message type
C. ICMP packet with a payload
D. UDP datagram with a protocol type
E. UDP datagram with a payload
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
Which of the following entries can an administrator add to syslog.conf file to have all syslog messages generated by the administrator system go file to have all syslog messages generated by the administrator? system go to virtual console 12?
A. *.* /dev/tty12
B. /var/log/messages | /dev/tty12
C. | /dev/tty12
D. syslog tty12
E. mail.* /dev/tty12
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which file specifies the user accounts can NOT submit jobs via at or batch? (Provide the full path and filename).

A

/etc/at.deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The ________ command is used to add a group to the system. (Please enter only a single command and do not enter duplicate answers in this field.)

A

groupadd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
An administrator has just set up the X Display Manager as the default display manager. Which of the following files should be edited to change the default background for it?
A. /etc/X11/xdm/Xsetup
B. /etc/X11/prefdm
C. /etc/X11/xorg.conf
D. /etc/X11/xdm.conf
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What word is missing from the following SQL statement? update tablename ____
fieldname=’value’ where id=909;

A

set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the command to delete the default gateway from the system IP routing table? (Please
specify the complete command with arguments, please no duplicate answers in this field.)

A

route del default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
An administrator is running an email server configured with the default settings. In which directory will the administrator commonly find the delivered mail for the user foo?
A. /var/spool/mail
B. /home/foo/mail
C. /var/mail/spool
D. /var/users/mail
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
For accessibility assistance, which of the following programs is an on-screen keyboard?
A. xkb
B. atkb
C. GOK
D. xOSK
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What word is missing from the following SQL statement? select count(*) _____ tablename;

A

from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which option, when passed to the gpg command, will enter an interactive menu enabling the user to perform key management related tasks? (Provide only one option).

A

edit-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
All of the following are contained in the locale setting of the operating system EXCEPT:
A. currency symbol
B. language
C. timezone
D. thousands separator
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
An administrator discovers a pending job for the at command. Which of the following does the administrator need to use to remove it?
A. atrm
B. atq -r
C. at -e
D. rmat
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
A French user has installed the French language pack, but currencies are still being displayed with a leading '$' sign in spreadsheets. Which of the following must be done to fix this?
A. Alter the locale.
B. Set the timezone correctly.
C. Edit /etc/currency.
D. Reinstall the French language pack.
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

An administrator has a user whose account needs to be disabled but not removed. Which of the following should the administrator do?
A. Edit /etc/gshadow and just remove the user name. and just remove the user? name.
B. Edit /etc/passwd and change all numbers to 0.
C. Edit /etc/shadow and remove the last field.
D. Edit /etc/passwd and insert an * after the first : .
E. Edit /etc/group file and put a # sign in front of the user name. sign in front of the user? name.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
An administrator suspects that a gateway machine on their network has failed; the administrator is unsure which machine is the problem. Which of the following commands will help locate the
problem machine?
A. ps
B. netstat
C. nslookup
D. ifconfig
E. traceroute
A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
While performing a security audit, an administrator discovers that a machine is accepting connections on TCP port 184, but it is not obvious which process has the port open. Which of the following programs should the administrator use to find out?
A. traceroute
B. strace
C. debug
D. nessus
E. lsof
A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

An administrator wants to temporarily prevent users from logging in. Please complete the following command: touch /etc/______

A

nologin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
An administrator needs to pause the CUPS printer Laserjet4, and wants to cancel all print jobs with a message, "hello". Which of the following commands will do this?
A. cupsreject -c -r hello Laserjet4
B. cupsreject -p -m hello Laserjet4
C. cupsdisable -c -r hello Laserjet4
D. cupsdisable -p -m hello Laserjet4
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

To prevent a specific user from scheduling tasks with at, which of the following should the administrator do?
A. Add the specific user to /etc/at.allow file.
B. Add the specific user to [deny] section in the /etc/atd.conf file.
C. Add the specific user to /etc/at.deny file.
D. Add the specific user to nojobs group.
E. Run the following: atd –deny [user].

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q
Which of the following commands would an administrator use to create an OpenSSH
authentication key?
A. sshd
B. ssh-agent
C. ssh-keygen
D. ssh-add
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

An administrator is logged in as root. What command should the administrator run to find out what groups user bruno belongs to?

A

groups bruno

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following can the chage command <b>NOT change?
A. The number of days since January 1, 1970 on which the user account will no longer be accessible.
B. The number of days since January 1, 1970 when the password can change.
C. The number of days since January 1st, 1970 when the password was last changed.
D. The maximum number of days during which a password is valid.
E. The number of days of inactivity after a password has expired before the account is locked</b>

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to print the status of the printer’s queue? (Provide only the command, without any options or parameters)

A

lpq

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which of the following benefits does an alias provide?
A. It provides faster lookups for commands.
B. It prevents having to type long commands
C. It hides from others the command that is being run.
D. It creates a local copy of a file from another directory.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
Which of the following is the BEST way to list all defined shell variables?
A. env
B. set
C. env -a
D. echo $ENV
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
All of the following information is provided in any output from the netstat utility EXCEPT:
A. broadcast services
B. interface statistics
C. masquerading connections
D. network connections
E. routing tables
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
On a system using shadowed passwords, the correct permissions for /etc/passwd are \_\_\_ and the correct permissions for /etc/shadow are \_\_\_.
A. -rw-r-----, -r--------
B. -rw-r--r--, -r--r--r--
C. -rw-r--r--, -r--------
D. -rw-r--rw-, -r-----r--
E. -rw-------, -r--------
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q
Which of the following Class B IPv4 networks are reserved by IANA for private address assignment and private routing? (Select TWO).
A. 128.0.0.0
B. 169.16.0.0
C. 169.254.0.0
D. 172.16.0.0
E. 172.20.0.0
A

D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q
The correct crontab entry to execute the script chklog once per hour between 3 p.m. and 5 p.m. on Monday and Thursday each week is, which of the following?
A. 0 3,4,5 * * 2,5 chklog
B. 0 3,4,5 * * 1,4 chklog
C. 0 15,16,17 * * 1,4 chklog
D. 0 15,16,17 1,4 * * chklog
E. * 15,16,17 * * 1,4 chklog
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q
Which of the following commands allows an administrator to make a shell variable visible to subshells?
A. export $VARIABLE
B. export VARIABLE
C. set $VARIABLE
D. set VARIABLE
E. env VARIABLE
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

When attempting to send a file to another user securely with GPG, which of the following actions must be done?
A. Encrypt the file using your public key.
B. Encrypt the file using their public key.
C. Encrypt the file using your private key.
D. Encrypt the file using their private key.
E. Sign the file with your public key.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which IP protocol is connectionless and unreliable? (Please enter only a single answer and do not enter duplicate answers in this field.)

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q
In xorg.conf, which of the following sections is concerned with fonts?
A. The Fonts section
B. The Files section
C. The xfsCodes section
D. The Graphics section
E. The modeline section
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

In an xinetd config file, what attribute specifies the network address that will be used to offer the service? (Please enter only one answer and do not enter duplicate answers in this field.)

A

bind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following outputs will the below command sequence produce? echo ‘1 2 3 4 5 6’ |
while read a b c; do echo result: $c $b $a; done
A. result: 3 4 5 6 2 1
B. result: 1 2 3 4 5 6
C. result: 6 5 4
D. result: 6 5 4 3 2 1
E. result: 3 2 1

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

The _____________ command is used to print the network connections, routing tables, and interface statistics. (Please enter only a single command and do not enter duplicate answers in this field.)

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q
X is running okay but an administrator is concerned that the correct color depth set is not configured. Which of the following commands will show the administrator the running color depth while in X?
A. xcd
B. xcdepth
C. xwininfo
D. xcolordepth
E. cat /etc/X11
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which of the following words is used to restrict the records that are returned from a SELECT query
based on supplied criteria for the values in the records?
A. LIMIT
B. FROM
C. WHERE
D. IF

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which of the following outputs will the command seq 10 produce?
A. A continuous stream of numbers increasing in increments of 10 until stopped.
B. The numbers 1 through 10 with one number per line.
C. The numbers 0 though 9 with one number per line.
D. The number 10 to standard output.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

The _________ command is used to assign an IP address to a device. (Please specify a single
command with or without path information)

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which of the following is the purpose of the Sticky Keys feature in X?
A. To assist users who have difficulty holding down multiple keys at once
B. To prevent repeated input of a single character if the key is held down
C. To ignore brief keystrokes according to a specified time limit
D. To repeat the input of a single character

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q
Which of the following commands can be used to activate a specific network interface?
A. ipup
B. net
C. ifup
D. netup
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

An administrator is looking into a new script that they have just received from a senior
administrator. In the very first line the administrator notices a #! followed by a path to a binary.
Linux will:
A. ignore the script.
B. use that binary to interpret the script.
C. use that binary to compile the script.
D. be replaced by that binary.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q
Which of the following commands should be used to print a listing of emails in the system's mail
queue?
A. sendmail -l
B. lpq
C. mailq
D. mlq
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Given the following line from /etc/nsswitch.conf: hosts: files mdns4_minimal [NOTFOUND=return]
dns mdns4 By default, which file will be queried first for hostname lookups? (Provide the full path
and filename).

A

/etc/hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What command can be used to generate log entries of any facility and priority? (Supply just the
command name without a path).

A

logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q
Each entry in a crontab must end with which of the following characters?
A. tab
B. space
C. backslash
D. newline
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

To exclude all log messages of a given logging facility, an administrator should use a logging
priority of _____ .

A

none

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What argument to the -name flag of find will match files or directories beginning with a ‘.’ (period)?

A

*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A department decided to change the Gnome Display Manager’s greeting. Which of the following
configuration files should an administrator edit?
A. /etc/gnome/greeting
B. /opt/gnome/share/greeting
C. /etc/X11/gmd.conf
D. /etc/X11/gdm/Init/Default

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q
Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Select
THREE).
A. postfix
B. procmail
C. sendmail
D. exim
E. smtpd
A

A, C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which file lists which users can execute commands using sudo? (Provide the full path and
filename).

A

/etc/sudoers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which file contains a list of services and hosts that will be denied by a TCP Wrapper such as
tcpd? (Please enter the full path).

A

/etc/hosts.deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

On a dual boot system, every time the system is booted back into Linux the time has been set
backward by two hours. Which of the following commands will correct the problem so it will not
occur again?
A. ntpdate pool.ntp.org
B. date -d ‘two hours’
C. hwclock –hctosys –localtime
D. time hwclock

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which of the following files, when using Sendmail or a similar MTA system, will allow a user to
redirect all their mail to another address and is configurable by the user themselves?
A. /etc/alias
B. /etc/mail/forwarders
C. ~/.alias
D. ~/.forward

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

A senior executive asked an administrator to change the default background of the executive
machine, which uses XDM. Which of the following filesA senior executive asked an administrator
to change the default background of the executive? machine, which uses XDM. Which of the
following files would the administrator edit to achieve this?
A. /etc/X11/xdm/Xsetup
B. /etc/X11/xdm.conf
C. /etc/X11/xdm/Defaults
D. /etc/X11/defaults.conf

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q
Which of the following should be backed up before a Samba version upgrade? (Choose TWO
correct answers.)
A. Libraries
B. TDB files
C. Configuration files
D. Binaries
E. winbindd_privileged directory
A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

How is VFS (Virtual File System) support enabled in Samba?
A. Samba does not support VFS.
B. Compile and load vfs.ko kernel module.
C. Compile and load vfs.ko and its dependent smbfs kernel modules.
D. Compile and load pvfs.ko kernel module.
E. Compile Samba with VFS module support.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which command from the Samba Suite is used to retrieve information on the mapping between NetBIOS names and IP addresses?

A

nmblookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following commands will mount a remote Samba share when the user is Winuser and
the password is somepass?
A. mount -t smbfs -o username=Winuser,password=somepass //SERVER/share
/media/sambashare
B. mount -t smbfs -o username=Winuser,password=somepass \SERVER\share
/media/sambashare
C. mount -t smbfs -o Winuser%somepass //SERVER/share /media/sambashare
D. mount -t smbfs -o username=Winuser%somepass //SERVER/share /media/sambashare

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

After installing a network with one Samba server and several clients, users are complaining that
they receive an Unable to browse the network error when trying to visit a public share. What is the
most likely cause of this?
A. The user entered the wrong username and/or password.
B. The nmbd process is not running on the Samba server.
C. The user hasn’t mapped the share to a local drive letter yet.
D. The Samba server is not configured as a Domain Master Browser

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q
Which node type will use only NetBIOS broadcast requests using UDP broadcast?
A. b-node (type 0x01)
B. p-node (type 0x02)
C. m-node (type 0x04)
D. h-node (type 0x08)
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which port must be open in a firewall to allow access to rdesktop?

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which port is used for “NetBIOS-less” SMB traffic?

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

A ______ server stores NetBIOS names and IP addresses of SMB/CIFS clients

A

wins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q
By default, Windows XP requires that passwords on your Samba server:
A. Do not exceed 32 characters.
B. Contain both numbers and letters.
C. Are encrypted.
D. Are changed every 30 days.
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q
When setting up roaming profiles in a Windows network which includes Windows 98 desktops,
which Samba parameter must be set?
A. logon drive
B. logon home
C. logon path
D. logon script
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What DHCP option can be set on a ISC DHCP server to tell NETBIOS clients that the WINS
server has the IP address 192.168.1.2?
A. option netbios-wins-servers 192.168.1.2;
B. option wins-netbios-servers 192.168.1.2;
C. option wins-name-servers 192.168.1.2;
D. option netbios-name-servers 192.168.1.2;

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q
Which of the following development libraries are used to make Samba compatible with ADS?
(Select TWO correct answers.)
A. Kerberos
B. CUPS
C. LDAP
D. Win32
E. IMAP
A

A, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q
Which smb.conf configuration keyword determines the hostname resolution order?
A. use ads
B. name resolve order
C. use nsswitch.conf
D. use resolv.conf
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What is the meaning of a NetBIOS hybrid node (h-node) type client?
A. Client performs a broadcast and does not query WINS.
B. Client queries WINS first, and then broadcasts.
C. Client broadcasts first, and then queries WINS.
D. Client only queries WINS and does not broadcast.
E. Client only queries lmhost local file.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Which of the following statements are true when creating NETBIOS names? (Select TWO correct
answers.)
A. NETBIOS names can only use alphanumeric characters.
B. You can use a ‘.’ in a NETBIOS name.
C. You can use an ‘_’ (underscore) in a NETBIOS name.
D. NETBIOS names must be UPPERCASE
E. NETBIOS names can be a maximum of 32 characters

A

B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Which command would create a machine account in Active Directory under the
Computers\BusinessUnit\Department\Servers organizational unit?
A. net rpc join -m localhost -
ldap=”ldap.ldapserver.com:Computers\BusinessUnit\Department\Servers”
B. rpcclient -c “join Computers\BusinessUnit\Department\Servers”
C. net ads join ou=”Computers\BusinessUnit\Department\Servers”
D. net ads join “Computers\BusinessUnit\Department\Servers”

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q
In which section of the smb.conf configuration file is the logon script declared?
A. [homes]
B. [netlogon]
C. [global]
D. [profiles]
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Which of the following commands would you run to add your machine to an NT4 domain?
A. net rpc join -S PDC -UAdministrator%password
B. net ads join -s PDC -UAdministrator%password
C. net rpc join -s PDC -UAdministrator%password
D. net ads join -W PDC -nAdministrator%password

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

When migrating files from a Windows server A to a Samba server B with the command ‘net rpc
share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally
belong only to a Windows group (no user) will generate errors during the migration. Which option
in smb.conf will force such files to be mapped to the correct UNIX UID and GID?
A. use acl = yes
B. map group acls = yes
C. force unknown acl user = yes
D. inherit acls = no

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q
When no WINS server is present, all name registrations and lookups are done by UDP \_\_\_\_\_\_\_.
A. broadcast
B. multicast
C. unicast
D. None of the above.
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which are the FOUR parameters (in the correct order) to be set in the name resolve order
directive, to use the following name resolution order?
1. Use lmhosts file entries 2 Use a server especified in the ‘wins server’ directive Use broadcast
Use default DNS lookup

A

lmhosts wins bcast host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

It is desired to restrict access to the [IPC$] share to one specific machine. The setting hosts allow
= 192.168.0.3 is added to the share configuration. Later it is discovered that other workstations
may still access it. What setting was forgotten in the share configuration? (Enter the parameter
and any options or values)

A

DenyHosts=0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q
The response times on a Samba server are gradually increasing, so it is decided to experiment
with various socket options in smb.conf. Which of the following are valid values for this parameter?
(Choose THREE correct answers)
A. TCP_NODELAY
B. SO_NOBROADCAST
C. SO_TXBUF
D. IPTOS_LOWDELAY
E. SO_KEEPALIVE
A

A, D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

The _____________ parameter in the smb.conf file will set hidden files in Linux to also be hidden
in windows. (Please specify ONLY the parameter with no value assignment.)

A

hide dot files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

There are multiple network interfaces on a server. Which parameters must you set in smb.conf to
limit on which interfaces Samba will accept connections? (Choose TWO correct answers)
A. listen interfaces
B. bind interfaces only
C. interfaces
D. listen address

A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Users are reporting that they can access all user home directories on the server in addition to their own. What value must be added to the valid users parameter in the [homes] section of smb.conf to
disallow this behaviour? (Enter only the required value, do not include the parameter name)

A

%S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

The following output is generated when trying to obtain tickets from the Kerberos realm: # kinit
user@SUB.DOMAIN.BIZ Password for user@SUB.DOMAIN.BIZ kinit(v5): Clock skew too great
while getting initial credentials How can the problem be fixed? (Choose TWO correct answers.)
A. ntpdate domaincontroller; hwclock -systohc
B. kinit -t
C. killall -HUP krb5kdc
D. Modify the time_sync value in the kdc.conf file.
E. Modify the clockskew value in the krb5.conf file

A

A,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Which of the following is true about the following share access properties? (Choose TWO correct
answers.) [projects]path = /data/projects read only = noadmin users = timo, taki, +managers
A. +managers will be resolved as a Winbind group.
B. The timo and taki users can manipulate files regardless of the file system permissions.
C. +managers will be resolved as a Unix group.
D. +managers is a builtin default Samba group.
E. The “admin users” can be applied only to print shares.

A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q
In /etc/smbldap-tools/ which file contains the DN and password for the LDAP manager?
A. smbldap.conf
B. ldap.conf
C. smbldap_bind.conf
D. slapd.conf
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q
Which option below shows the correct command line to list the shares exported by the Samba
server called NAME?
A. smbcontrol -L
B. smbclient -N NAME
C. smbclient -L NAME
D. smbmount -L NAME
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q
In the smb.conf configuration file, which pair may be used as a boolean value?
A. yes/no
B. true/false
C. 0/1
D. Any of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Samba cannot be a Backup Domain Controller for an NT4 PDC because:
A. Samba 3 implements 128-bit encryption, which is unsupported by an NT4 PDC.
B. the native NT4 SAM replication protocols have not yet been fully implemented.
C. the database backends used by each server are incompatible.
D. the Samba team does not want to encourage the use of a Windows server as a PDC.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Which command executes a recursive download of the src share located in a Samba server
named SOURCES, assuming that this server allows anonymous users? (Specify the command
and any arguments and parameters.)

A

smbget -R smb://sources/src

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

A Samba server needs to determine the SID of an existing domain called FOO. Complete the
command below which on the Samba server that will achieve this result: net rpc _______ FOO

A

getsid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

How is the user user01 from DOMA granted the right to manage printers in the Samba print
server?
A. net ads rights ‘DOMA\user01’ +SePrintOperatorPrivilege
B. net -S server -U domadmin rpc rights grant ‘DOMA\user01’ SePrintOperatorPrivilege
C. pdbedit -user=user01 -I=DOMA -policies=SePrintOperatorPrivilege
D. pdbedit DOMA\user01 +PrintOperator
E. cupsaddsmb DOMA\user01 +PrintOperator

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

When using a localized installation of Windows - such as Japanese or Chinese - the names of files
which are stored on the server do not display correctly in Windows Explorer. Which parameters in
smb.conf should be checked? (Choose TWO correct answers)
A. unix charset
B. display charset
C. dos charset
D. windows charset
E. Unicode

A

A, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

After updating the smb.conf file, it is a good idea to run the _________ command before restarting
the Samba service. (Enter the command only with no path information.)

A

testparm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q
What command (excluding path information) will display the compile time options for Samb
a. Please include all options.
A

smbd -b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q
Which command will list the shares on the workstation with the NetBIOS name officepc and IP
address 192.168.0.3?
A. smbclient -L -I 192.168.0.3
B. smbclient -L officepc
C. smbclient -l -n officepc
D. smbclient -list -I 192.168.0.3
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q
In which section of smb.conf should the path to the domain policy file be declared?
A. [netlogon]
B. [homes]
C. [profiles]
D. [policy]
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

If logon drive = H: is set in the Samba main configuration file, the server will automatically map the
home directory for each user to the drive H: as soon as logon is executed. What is the equivalent
command for this directive in a logon script?

A

netuse h:/home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q
Which smbldap-tools configuration files require modification before using the TOOLs? (Select
THREE correct answers.)
A. smbldap.conf
B. smbldap_tools.pm
C. ldap.conf
D. smb.conf
E. smbldap_bind.conf
A

A, B, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

A new Samba server (Version 3) has been setup with a brand new colour laser printer. The printer
is attached to the parallel port and is setup using CUPS. What share must you setup in your
smb.conf file to allow client computers to download the new drivers?
A. [printers]
B. [print$]
C. [printer$]
D. [cups$]

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

The SAMBADOM domain has been added as a trusted account to an existing domain called
WIN3K. Which command should be run on the Samba server in order to establish the trusted
relationship to the WIN3K domain?
A. net rpc trustdom add WIN3K
B. net rpc addtrust WIN3K
C. net rpc trustdom establish WIN3K
D. net rpc trustdom establish SAMBA

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

By default, on what port does SWAT listen?

A

901

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

By specifying the _________ parameter in smb.conf and assigning it an appropriate value, Samba
will create Machine Trust Accounts automatically when the client joins the domain.

A

add machine script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q
Which command typed on a Samba 3 server will print out the local SID?
A. net get sid localhost
B. net getlocalsid
C. net getsid
D. net rpc get localsid
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What command will test the file /root/smb.conf for internal correctness? (Enter the command and
any required options or parameters)

A

testparm /root/smb.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q
When a Windows domain controller is used, which of the following is assigned a Windows Security
Identifier?
A. Users
B. Servers
C. Groups
D. Only A and C above
E. All of the above
A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

The command _______ is used on a Samba 3 server to modify the SSID in an existing NT profile
file called NTUser.DAT.

A

profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What must be done to allow only users of the devel system group to access a share?
A. In the smb.conf file, set valid users = @devel
B. In the smb.conf file, set valid groups = @devel
C. In the smb.conf file, set valid groups = devel
D. chgrp the directory on the Samba server to the devel group, and then set the GID bit on the
directory.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

In the [global] section of the smb.conf file, the following parameter is set: map to guest = Bad
Password Which of the following statements are true? (Select TWO correct answers.)
A. Users using an invalid password are treated as a guest account.
B. Users using an invalid password are rejected from accessing shares.
C. Users will receive warning messages that they are using an incorrect password
D. This parameter is required to setup public shares on the samba server when the security
parameter is set to user.

A

A, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What does the entry valid users = @smbusers in the smb.conf file mean when used in a share
section?
A. Only users connecting from the machine called smbusers can use this share.
B. Files saved in the specified share will be owned by the group smbusers.
C. Only users in the unix group called smbusers can access this share.
D. Only the user account smbusers can access this share.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q
Which smbclient option is used when connecting to a server as an authenticated user? (Select
TWO correct answers.)
A. -user
B. -u
C. -guest
D. -password
E. -U
A

A, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Select the TWO correct statements about the smbpasswd command:
A. The -d parameter deletes the account from Samba database.
B. The -a parameter adds account to the Samba database. If the account already
exists, this parameter is ignored.
C. The -x parameter removes the account from the Samba database.
D. the -e parameter excludes the account from the Samba database.
E. smbpasswd enables password changes only on Samba servers and not regular Windows
servers.

A

B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q
Which of the following lines should be added to smb.conf to use authenticate users against the
Kerberos domain bc.ep.kerberos.biz?
A. kerberos = bc.ep.kerberos.biz
B. realm = bc.ep.kerberos.biz
C. krb5 = /etc/krb5.conf
D. krb5 workgroup = bc.ep.kerberos.biz
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

A default user profile can be stored in a subdirectory of profiles/ called ________.

A

default user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Which backend must be included in the smb.conf’s passdb backend parameter in order for users
to authenticate against an LDAP directory?

A

ldapsam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Which component of the Samba suite allows Windows domain users to appear and operate as
Unix users on a Unix machine?

A

winbind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

If the idmap parameter is not specified in smb.conf, in which database file will winbind store its
UID/GID/SID mappings? (Enter only the filename, without a path)

A

winbind_idmap.tdb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What command will delete the user account joeuser from a Samba server. (Include ANY required
options.)

A

smbpasswd -x joeuser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q
With Samba 3, which LDAP object class contains the Samba password attribute in the LDAP
backend.
A. sambaSamAccount
B. shadowAccount
C. inetOrgPerson
D. sambaUnixIdPool
E. sambaPasswdMap
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q
Which parameter in the smb.conf defines how long the winbind daemon will cache user and group
information?
A. winbind cache time
B. idmap cache time
C. cache time
D. nscd cache time
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Select the TWO correct answers relating to the scripts of smbldap-tools package:
A. The /etc/smbldap-tools/smbldap_bind.conf file contains the access credentials for the LDAP
server.
B. The smbldap-migrate-accounts command is used to migrate accounts from a LDAP server to a
NT server.
C. The smbldap-usershow command displays just the user accounts on the Samba server.
D. smbldap-passwd is used to create and change users passwords.
E. The smbldap-useradd command creates user accounts in both the Samba and LDAP
backends.

A

A, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Which line should be added to smb.conf to avoid UID and GID inconsistencies across servers over
SMB?
A. ldap dn = ldap://ldapserver.com
B. ldap server = ldap://ldapserver.com
C. idmap backend = idmap_rid:BUILTIN=ldapserver.com
D. idmap backend = ldap:ldap://ldapserver.com
E. ldap passwd sync = ldapserver.com

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

How can the risk of UID/GID inconsistencies be avoided across UNIX/Linux systems that are
sharing information over protocols other than SMB/CIFS (eg: NFS)?
A. Specify a common LDAP idmap backend in smb.conf.
B. Specify a common Kerberos realm in smb.conf.
C. Specify a common domain name in smb.conf.
D. Specify a common password server in smb.conf.
E. Specify a common winbind id range in smb.conf.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

While attempting to create a user in the Samba database, the following message appeared: #
smbpasswd –a john New SMB password: Retype new SMB password:
… Failed to initialise SAM_ACCOUNT for user john. Does this user exist in the UNIX password
database?Failed to modify password entry for user john Select the correct explanation for why this
error occurred.
A. The user john must be created in the Linux environment before it can be added to the Samba
database.
B. The Samba database is not compatible with the Linux backend.
C. The account user synchronization of Samba and Linux was not properly done.
D. The SAM_ACCOUNT script could not be started properly because the user running the
smbpasswd command does not have enough permissions

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

The configuration below is contained in the Samba main configuration file: [homes] comment =
Home folder writable = yes browseable = no valid users = %S However, an attempt at listing the
share with smbclient didn’t work. Which TWO options below could be possible reasons for this?
A. One of the reasons is that the browseable directive was set to no, denying the share listing to
anonymous users.
B. If the smbclient command was executed by an authenticated user, the share would be listed.
C. The configurations above are correct, but the administrator forgot to reload the configuration by
restarting the Samba daemon.
D. The real problem is in the valid users directive, which allows access to the share, but denies
access to the Linux file system.
E. The writable option is in the wrong place in the configuration file.

A

A, B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Which command will import an smbpasswd file located in /etc/samba to a TDB data file? ______ -I
smbpassd:/etc/samba/smbpasswd

A

pdbedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

The _______ command will dump out the contents of a Samba printer drivers TDB file.

A

tdbdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

When ________-level security is used, the client will be able to mount multiple shares without
supplying further credentials after the first successful authentication

A

user

181
Q

Which of the following statements about the Samba 3 server are true? (Select THREE correct
answers.)
A. The server can be a Domain Controller on an ADS domain.
B. The server can join an ADS domain as a member.
C. Provided the necessary UNIX groups are created and mapped, the server can automatically
migrate usernames to the local SAM.
D. User and group IDs are mapped to an LDAP backend by default.
E. The server password backend supports LDAP operations.

A

B, C, E

182
Q

Which parameter will hide the files or directories that a user cannot read?

A

hide unreadable = Yes

183
Q

A software vendor states that their SMB client software may perform better if the maximum packet
size of SMB commands is limited to 32768 bytes. How would Samba be instructed to limit the size
of requests it will accept?
A. echo 32768 > /proc/sys/smb/max-rx
B. Start the smbd daemon with the -x 32768 option.
C. Set socket options = TCP_MAXRX_HALF in smb.conf.
D. Set max xmit = 32768 in smb.conf.

A

D

184
Q

An anonymous user had her access denied while she was trying to access the share called
reports on a Samba server using the smbclient command. Assuming that it is necessary for
anonymous users to access that share, what must be configured (in the Samba configuration file)
to allow access? Please specify the full directive and value.

A

guest ok = yes

185
Q

Below is an ACL entry from a slapd.conf file. Fill in the access control level setting to prevent users
from retrieving passwords. access to attrs=lmPassword,ntPassword by
n=”cn=smbadmin,dc=samplenet” write by * _______

A

none

186
Q

What VFS module will record the UID and IP address of any client that tries to open a file?

A

full_audit

187
Q

Which parameter in smb.conf prohibits users from accessing files outside of the share by following
symbolic links?
A. wide links = No
B. follow links = No
C. links = No
D. No parameter is needed because smbd runs in a chroot jail.

A

A

188
Q
Which option is used when running smbclient with a file containing user credentials?
A. -F
B. -c
C. -s
D. –A
A

D

189
Q

A Samba server is configured to use the LDAP password backend. The root DN for the LDAP
directory is defined in slapd.conf. In order to define an alternative account used by the Samba
administrator, which steps are necessary? (Select THREE correct answers.)
A. Make sure the password for the new administrative account matches the UNIX root password.
B. Add a new Samba administrative account to the LDAP directory.
C. Make certain that the ‘ldap admin’ option in smb.conf does not point to the LDAP root DN.
D. Map the administrative account to the domain administrator.
E. Change the ‘access’ attributes in slapd.conf.

A

B, C, E

190
Q

Which of the following are roles of the winbindd service? (Choose TWO correct answers)
A. Maintain mappings between Unix UID/GID and Windows SID.
B. Retrieve the user’s password from the Windows server.
C. Add machine accounts to the idmap table.
D. User authentication by querying a Windows server.
E. Proxy the request of the WINS search to the appropriate Windows server.

A

A, D

191
Q

The ______ daemon allows users and groups from a Samba domain to be recognized by Linux as
system users in each machine of a domain, avoiding the need to create users locally.

A

winbind

192
Q
Select which groups must map to UNIX GIDs on a Samba server operating as a PDC. (Select
TWO correct answers.)
A. Domain Administrators
B. Domain Users
C. Domain Guests
D. Domain Controllers
E. Domain Operators
A

B, C

193
Q

What does the ! mean when used at the beginning of a line in the username map file?
A. That account has been disabled.
B. To stop processing the file if there is a match.
C. It indicates that it is a system group, not a username.
D. It is a comment.

A

B

194
Q

Which command is used to test the winbind configuration in a Samba server?

A

wbinfo

195
Q

What does the character ‘X’ mean in the account flag of the smbpasswd database?
A. This account is used for a trust relationship.
B. The user has to change the password on their next login.
C. Passwords have no time limit.
D. This account has a password for LANMAN only and not NTLM.

A

C

196
Q
Which command will display the groups a user belongs to on a remote SMB server?
A. net rpc group info
B. net rpc group member
C. net rpc user info
D. smblookup member
E. smblookup user
A

C

197
Q

The net ________ command is used to manage group mapping. (Specify only the sub command.)

A

groupmap

198
Q

The command ______ -x foo will delete the user foo from the Samba database. (Specify the
command only, no path information.)

A

pdbedit

199
Q

In order to use the user and group mappings stored in an LDAP directory, which setting in
smb.conf is correct?
A. idmap backend = ldap://ldap.example.com:636
B. idmap backend = ldap:ldap://ldap.example.com:636
C. idmap backend = ldap server = ldap://ldap.example.com:636
D. idmap backend = ldap

A

B

200
Q
Which option to smbldap-useradd will add a machine account?
A. -m
B. -W
C. -w
D. -M
E. –h
A

C

201
Q
When running the configure script for Samba, which configuration option is used to include support
for managing filesystem ACLs?
A. -fs-acl
B. -with-acl-support
C. -ms-acl
D. -with-fs-acl
A

B

202
Q

When upgrading from Samba 2 to Samba 3, which of the following points should be considered when user information is stored in a LDAP server? (Select TWO correct answers.)
A. Never run the Samba 3 server before the configuration to use the LDAP server is complete.
B. Convert all passwords in the LDAP server to the new encryption method.
C. Set the domain SID of Samba 3 to the same value of Samba 2 with the net setlocalsid
command.
D. Dump all data files created by Samba 2, and restore them with Samba 3 to fix the ACLs.
E. Change the permissions of the files created by Samba 2 to match the group permissions in
Samba 3.

A

A, C

203
Q

To avoid having to add a machine trust account to a PDC for each Windows client in the domain (using the useradd command), a directive can be used in the Samba configuration file. Select the
option below that shows the best solution for this situation.
A. name resolve order =
B. machine map = /etc/samba/machines
C. add machine script
D. logon script
E. read only = no

A

C

204
Q

Which of the following statements are true of the Samba Web Administration Tool? (Choose THREE correct answers)
A. SWAT will completely replace your existing smb.conf file.
B. By default, SWAT runs with SSL over HTTPS.
C. No comments exist in a SWAT-generated smb.conf file.
D. SWAT will not write a parameter to smb.conf if it is set to the default setting.
E. For security purposes, Microsoft Windows user passwords cannot be changed via the SWAT
web interface.

A

A, C, D

205
Q
Which files store printer and driver properties created on the server?
A. ntprinters.tdb and ntdrivers.tdb
B. printers.tdb and drivers.tdb
C. ntforms.tdb and ntprinters.tdb
D. printers.tdb and spooler.tdb
E. print_spool.tdb and ntdrivers.tdb
A

A

206
Q

The ________ parameter in smb.conf limits the maximum number of jobs allowed in a Samba
printer queue at any given moment.

A

max print jobs

207
Q

For Samba to be able to work as a PDC, some modifications are needed in its main configuration file. Select the THREE options below that show the required actions for this task.
A. The Samba server has to be a logon server. This can be configured by the domain logons directive.
B. The Samba server needs to have the logon and the account creation scripts, to properly setup
the PDC environment.
C. The Samba server must be a Domain Master Browser. To configure this, the domain master
directive must be set to yes.
D. The time server = yes directive needs to be configured, so Samba will behave as a WINS
server and also a Time server.
E. The security = user directive must be set.

A

A, C, E

208
Q
Which option below shows the correct command line to list the shares exported by the Samba
server called NAME?
A. smbcontrol -L
B. smbclient -N NAME
C. smbclient -L NAME
D. smbmount -L NAME
A

C

209
Q

The ________ command lists the domain group mappings. (Provide the full command with
arguments.)

A

net groupmap list

210
Q

In the smb.conf file, what does the %S variable mean?
A. Session Username
B. The name of the Samba Server.
C. The name of the service after the connection has been established.
D. The local IP address to which the client connected.

A

C

211
Q

Which command will launch smbd in daemon mode, overwriting existing log files, and listen on
port 139?
A. /usr/sbin/smbd -D -o -P 139
B. /usr/sbin/smbd -D -f /var/log/samba/smbd.log -P 139
C. /usr/sbin/smbd -D -f /var/log/samba/
D. /usr/sbin/smbd -D –o

A

D

212
Q
Which parameter should be set in smb.conf to enable off-line caching of data files.
A. offline policy = documents
B. offline = documents
C. csc policy = documents
D. vfs objects = offline
A

C

213
Q

What is the most suitable procedure for naming a Samba 3 server with non-English characters?
A. Specify the character set with the unix charset parameter in smb.conf.
B. Start the Samba daemons with an appropriate locale.
C. Specify the character set with the coding system parameter in smb.conf
D. Encode non-English characters using BASE64.
E. Escape non-English characters with octal code numbers.

A

A

214
Q
Which smb.conf setting will load the audit and recycle VFS modules?
A. vfs = audit recycle
B. vfs modules = audit,recycle
C. vfs modules = audit recycle
D. vfs objects = audit recycle
A

D

215
Q

What does the following command below do? smbclient //server/Reports -U func
A. The Samba server administrator is providing access permissions to the Reports share to user
func.
B. User func is downloading the content located in the Reports share of Samba server.
C. Computer func is trying to make a connection with a Samba server share, and the command
will prompt for the username and password.
D. User func is trying to connect to the Reports share in the Samba server.

A

D

216
Q

The log level parameter in smb.conf should normally not be set higher than 2 because:
A. Credentials supplied by the user are logged, which poses a security risk.
B. The increased verbosity has a negative impact on network bandwidth.
C. Most Samba administrators cannot understand the information presented at higher log levels.
D. The server flushes the log file after each operation, which affects overall performance.

A

D

217
Q

The command smbldap-useradd __________ will add the domain FOO as a trusted domain.
(Specify the options and arguments ONLY.)

A

-i FOO

218
Q

Which is the correct procedure to remove a machine account from a Samba PDC? Choose the
TWO correct procedures:
A. First of all, the account must be removed from Samba database, using the smbpasswd
command.
B. First of all, the account must be removed from Linux accounts database, using the userdel
command.
C. The second step is remove the account from Samba database, using the smbpasswd
command.
D. The second step is remove the account from the Linux accounts database, using the userdel
command.
E. The second step is restart the Samba daemon.

A

A, D

219
Q

When ________-level security is used, the client will be able to mount multiple shares without
supplying further credentials after the first successful authentication.

A

user

220
Q

The _______ command can be used to validate and backup a TDB file.

A

tdbbackup

221
Q
Which of the following ports are used by smbd? (Choose THREE correct answers)
A. 135/TCP
B. 137/UDP
C. 138/UDP
D. 139/TCP
E. 445/TCP
A

A,D,E

222
Q
Which files will be stored inside the directory specified below? # smbd -b |grep LOCKDIR
LOCKDIR: /var/cache/samba
A. Configuration files
B. TDB files
C. WINS name cache files
D. Samba print spool files
A

B

223
Q

The text below is an excerpt of the Samba main configuration file. Select the THREE correct
statements:
[global] logon script = logon.cmd [netlogon] path = /var/lib/samba/netlogon read only = yes write
list = root
A. The logon script has to be in ASCII Linux format.
B. The file excerpt shows that Samba will instruct the client to execute a logon script in order to
prepare the user’s environment.
C. The logon script directive is always relative to the [netlogon] share.
D. Any user can modify the logon.cmd script.
E. Samba doesn’t provide the logon.cmd script contents.

A

B,C, E

224
Q
Which command would be used to search for all available workgroups/domains and NetBIOS
names?
A. nmblookup
B. findsmb
C. smbget
D. smbclient
A

B

225
Q
How can it be checked that a machine was sucessfully added to an Active Directory enviroment?
A. net RPC testjoin
B. tdbdump /etc/samba/secret.tdb
C. testparm -v |grep join
D. net ADS testjoin
A

D

226
Q

What are the requirements for configuring a Samba file server to work in Active Directory mode?
(Choose THREE correct answers.)
A. Join a domain using the command: net ads join
B. Specify a realm in the smb.conf file.
C. Synchronize time with the realm server.
D. Use Winbind in the ADS mode with this command: winbindd -krb5
E. Create an administrator account with the pdbedit command.

A

A, B, C

227
Q

Which of the following are true when considering SMB/CIFS browsing? (Choose THREE correct
answers)
A. Servers and workstations register their presence to the network.
B. One or more machines on the network collate the local announcements.
C. It is not possible to share NetBIOS name information across subnets.
D. Elections are held to determine the roles of certain servers.
E. Currently, only Microsoft Windows servers can initiate an election.

A

A,B,D

228
Q

When configuring a Samba logon server to force Windows clients to run login.bat upon login, what
setting must be added to smb.conf to force execution of this script? Assume that the path to the
script is not needed. (Enter the correct parameter and value)

A

logon script = login.bat

229
Q

Which command will mount the accounting share hosted on the Windows server with the NetBIOS
name joeserv.
A. mount -t smbfs -h joeserv \accounting /mnt
B. mount -t smbfs -h joeserv //accounting /mnt
C. mount -t smbfs \joeserv\accounting /mnt
D. mount -t smbfs //joeserv/accounting /mnt

A

D

230
Q

After specifying wins server = 192.168.0.3 in smb.conf, the nmbd daemon now fails to start. This is
probably because the setting _______ = yes was also specified.

A

wins support

231
Q

Which of the following are true of CIFS? (Choose TWO correct answers)
A. Filenames can be in any character set.
B. Filenames can have a maximum length of 127 characters.
C. Unlike SMB, CIFS is not optimized for slow network connections.
D. Opportunistic Locks are supported.

A

A, D

232
Q

What is the most suitable procedure for accessing a Windows machine by its NetBIOS name from
a Linux system?
A. Setup a dynamic DNS server to accept updated records from the Windows machine.
B. Run nmbd and winbindd on the Linux system and enable the WINS proxy.
C. Import the list of the NetBIOS names into a NIS server and enable a NIS client on the Linux
system.
D. Install libnss_wins.so on the Linux system and configure the name service switch subsystem.

A

D

233
Q

Which command CANNOT be used to mount a shared filesystem in your Linux environment?
A. mount.cifs //server/share /mnt -o user=user
B. mount -t cifs //server/share /mnt -o user=user
C. mount -t smbfs //server/share /mnt -o username=user
D. smbmount //server/share /mnt -o username=user
E. cifsmount //server/share /mnt -o username=user

A

E

234
Q

What are the correct alternatives to the nmblookup command when performing NetBIOS lookups?
(Select THREE correct answers.)
A. nmblookup “server#20” looks for an authetication server called server.
B. nmblookup -S name lists the recorded names by the NetBIOS machine called name.
C. nmblookup -A lists all recorded names in the local NetBIOS server.
D. nmblookup “testing#1d” looks for a Local Master Browser for the workgroup TESTING.
E. nmblookup “server#1D” looks for a Master Browser Server called server.

A

B, D, E

235
Q
Which of the following are valid name resolution options for the name resolve order parameter in
smb.conf? (Choose THREE correct answers)
A. host
B. files
C. ldap
D. wins
E. bcast
A

A, D, E

236
Q

In order to restrict access to the SMB (445/tcp) port and stop the use of NetBIOS (139/tcp), what
parameter is required in smb.conf in Samba 3?
A. disable netbios = Yes
B. smb port = 445
C. disable directhosting = No
D. socket options = port:445

A

B

237
Q

In order to successfully configure cross-subnet browsing for the replication of browse lists, every
subnet must:
A. have one WINS server.
B. have one Local Master Browser.
C. have one Domain Master Browser
D. have a DHCP server capable of providing the WINS server’s address to each client.

A

B

238
Q

What is the lowest possible value for the os level parameter in smb.conf to ensure your Samba server will always win the election against any Microsoft server? (Enter only the number in numeric format)

A

33

239
Q

Which smb.conf directive is required to configure a Samba server to act as a WINS server?
A. wins proxy
B. wins server
C. wins support
D. Nothing needs to be done. All Samba servers are automatically a WINS server.

A

C

240
Q

The ______ command displays, along with other information, the computers in the NetBIOS
network working as a text mode equivalent to the Windows My Network Places feature.`

A

findsmb

241
Q

You need to configure Roaming Profiles in a Samba server called TECH. You have to create the profile in a sub-directory called profiles inside of each user’s home directory. What is the correct
logon path setting?
Please specify the full line with parameter and value.

A

logon path = \TECH\%U\profiles

242
Q

Which of the following is the correct syntax for including a schema file in slapd.conf?
A. include /usr/local/etc/openldap/schema/core.schema
B. allow /usr/local/etc/openldap/schema/core.schema
C. permit /usr/local/etc/openldap/schema/core.schema
D. add /usr/local/etc/openldap/schema/core.schema

A

A

243
Q
What does the LDIF acronym stand for?
A. Lightweight Database Interchange Format
B. LDAP Database Interchange Format
C. LDAP Data Internet File
D. LDAP Data Interchange Format
A

D

244
Q

Which of the following describes correct LDAP service definitions? (Choose THREE correct answers.)
A. LDAP was developed as a lightweight alternative to DAP.
B. LDAPv6 is the latest stable version specified by RFCs.
C. LDAP follows the X.500 directory standard.
D. X.500 directories can run only over TCP/IP.
E. LDAP is optimized for searching information.

A

A, C, E

245
Q

Select the INCORRECT statement regarding the LDIF file format:
A. It must contains a “dn” line (or distinguished name), that indicates where the attributes listed in
the following lines of the file must be added.
B. In the file, a blank line separates one entry from another one.
C. If the attribute contains binary data, some specific configurations must be made for this entry.
D. The LDIF file accepts any type of file encoding.

A

D

246
Q

All entries in an LDAP directory must have the __________ attribute.

A

objectClass

247
Q

A private OID should be obtained for a company when:
A. That company runs out of public OIDs.
B. The company intends to use LDAP for commercial purposes.
C. The company wants to make their directory available to the public on the World Wide Web.
D. The company plans to create custom schema files for their directory.

A

D

248
Q

When assigned to the ref attribute for ou=people,dc=example,dc=com, which of the following
values will create a subordinate knowledge link to slave.example.com?
A. ldap://slave.example.com/ou=people,dc=example,dc=com
B. ldap://slave.example.com?ou=people,dc=example,dc=com
C. ldap://slave.example.com ou=people,dc=example,dc=com
D. ldap://slave.example.com,ou=people,dc=example,dc=com

A

A

249
Q
Which statements are true of object classes in an LDAP directory? (Choose TWO correct
answers)
A. Auxiliary object classes - when used on their own - provide access to extended schema.
B. An entry cannot have more than one auxiliary object class.
C. An entry cannot have more than one structural object class.
D. Once an entry has been created, its structural object class cannot be changed without re
creating the entry.
E. Abstract object classes are no longer officially support by the LDAP protocol.
A

C, D

250
Q

What is true of any created custom attribute or object class?
A. It cannot be placed in one of the default distributed schema files.
B. The name must be registered with IANA to avoid conflicts with other custom schemas.
C. It must have a unique OID.
D. It must not contain any numbers.

A

C

251
Q
The \_\_\_\_\_\_\_ object class is used to point to a host that holds a subtree in a distributed directory
model. (Please enter only the object class name.)
A

referral

252
Q

Which of the following is correct about this excerpt from an LDIF file? dn:
cn=PrintOperators,ou=Groups,ou=IT,o=BR
A. dn is the domain name.
B. o is the organizational unit.
C. cn is the common name.
D. dn is the relative distinguished name.

A

C

253
Q

When configuring a Unix client to authenticate against a Microsoft Active Directory server, the toplevel
entry in the domain is dc=ad,dc=example,dc=com. What is the default DN of the container
where users and groups are stored?

A

cn=users,dc=ad,dc=example,dc=com

254
Q

When logged in to a workstation which retrieves most of its user information from NIS, which
command can be used to list ALL the users?
A. cat /etc/passwd
B. show users
C. ypusers list
D. getent passwd
E. cat /var/lib/nis/passwd

A

D

255
Q

An administrator has manually migrated local accounts to LDAP, instead of using the migration
tools. When trying to authenticate as a user, an error is returned about invalid credentials. What is
the most likely cause of this?
A. The password hash type was not included in the user’s password attribute.
B. Shadow passwords are incompatible with OpenLDAP.
C. The original password from /etc/passwd was not included.
D. The administrator forgot to run slappasswd to convert the hashes in /etc/shadow.
E. The administrator forgot to run ldappasswd to convert the hashes in /etc/shadow.

A

A

256
Q

What strategy is used to initialize NIS maps?
A. Create the yp.conf configuration file then restart the NIS server process.
B. Create the nis.conf configuration file then restart the NIS server process.
C. Start ypserver with the -new option.
D. Execute the make command from the /var/yp directory.

A

D

257
Q

After configuring PAM and NSS to integrate with OpenLDAP, the SSH server refuses to
authenticate users who are only in LDAP. What is the first step you should follow to debug this
problem?
A. Restart the pamd service.
B. Restart the sshd service.
C. Restart the nssd service.
D. Add the Use_LDAP = yes parameter to sshd_config.

A

B

258
Q

Which are common procedures to implement Samba with LDAP? (Choose TWO correct answers.)
A. Include the Samba schema into OpenLDAP.
B. Configure Samba password backend to point to OpenLDAP server.
C. Compile OpenLDAP with support to Samba authentication.
D. Include OpenLDAP core schema files into Samba configuration directory.

A

A, B

259
Q

Which attributes must be present when assigning the object class sambaSamAccount to a
particular user? (Choose TWO correct answers)
A. displayName
B. sambaSID
C. uid
D. sambaLMPassword
E. sambaNTPassword

A

B, C

260
Q

On a Postfix mail server, the command postconf -m is run to determine if OpenLDAP is supported.
Which storage medium would indicate support for OpenLDAP?
A. ldap
B. openldap
C. x500
D. dbm
E. ldaptable

A

A

261
Q

After finishing configuring of a Unix client to authenticate with a Microsoft Active Directory server,
login attempts are unsuccessful. Which of the following is most likely the cause?
A. Unix Client support is disabled in the Active Directory configuration.
B. The PAM library is searching the directory with the default search filter.
C. The slapd daemon is not running.
D. The user account in Active Directory has the remote login setting disabled.

A

B

262
Q

When configuring LDAP support on a FreeRADIUS server, which rlm_ldap parameter is used in
the radiusd.conf file to enable TLS? (Please enter the parameter only with no values.)

A

start_tls

263
Q

A user is unable to login on a workstation where NSCD was configured BEFORE the pam_ldap
and nss_ldap modules. What should be done to fix this problem?
A. Restart the NSS server.
B. Restart the nscd daemon.
C. Restart the PAM server.
D. nscd is incompatible with OpenLDAP and should be disabled.
E. nscd must be started with the -ldap=yes option.

A

B

264
Q
Which LDAP object class is used in a white pages implementation?
A. friendlyPerson
B. organizationalRole
C. posixAccount
D. inetOrgPerson
E. whitepageUser
A

D

265
Q
Which of the following are valid LDAP client commands? (Choose TWO correct answers.)
A. ldappasswd
B. ldapbrowser
C. slapcat
D. ldapwhoami
E. slaptest
A

A, D

266
Q

Which slapd database tool is used to add information to the directory while it is offline? (Enter the
command with no path, options or parameters)

A

slapadd

267
Q

Which changetype operation is used to rename the Relative Distinguished Name (RDN) of an
LDAP entry?

A

modrdn

268
Q
Which of the following switches for the ldapsearch command makes sure that search referrals are
followed?
A. -r
B. -C
C. -S
D. –R
A

B

269
Q

The _____ command should be used to backup your LDAP data while slapd is NOT running.

A

slapcat

270
Q

The _____ command is used to check the integrity of the slapd.conf file. (Enter only the command,
without any options or parameters.)

A

slaptest

271
Q
When two databases are defined in slapd.conf, which of the following commands will provide a full
dump of the second database?
A. slapcat -n 2
B. slapcat -2
C. slapcat -database 2
D. slap_dumpall -name nameofdatabase
A

A

272
Q

Which of the following arguments complete the command which will search for cn=ldapadmin OR
ou=BR recursively in the directory? ldapsearch -LLL -h server -s sub -b “o=inc” “_______”
A. ( (cn=ldapamin)|(ou=BR) )
B. ( |(cn=ldapamin) (ou=BR) )
C. ( (cn=ldapamin) (ou=BR) )
D. ( (cn=ldapamin) (ou=BR)| )
E. ( (cn=ldapamin)||(ou=BR) )

A

B

273
Q

Which of the following steps should be followed when configuring a slave slapd server? (Choose
THREE correct answers.)
A. Add a replica directive to slapd.conf.
B. Do not add a replogfile directive to slapd.conf.
C. Add an updatedn directive to slapd.conf.
D. Add a replogfile directive to slapd.conf.
E. Do not add a replica directive to slapd.conf.

A

B, C, E

274
Q

The _____ daemon provides the capability for a master slapd server to propagate changes to a
slave.

A

slurp

275
Q

Which of the following is the most appropriate method of debugging problems concerning ACLs?
A. Stop the OpenLDAP server daemon and run the command slapd -d 128.
B. Stop the OpenLDAP server daemon and run the command slapd -d 32.
C. Stop the OpenLDAP server daemon and run the command slapd -log_acl.
D. Stop the OpenLDAP server daemon and run the command slapd -debug_acl.

A

A

276
Q

After analyzing a slapd.conf file, an administrator noted that the rootdn and rootpw directives are
not present. Where is the LDAP administrator account defined?
A. It is using the default account admin with the password admin.
B. The account is defined by an ACL in slapd.conf.
C. It is using the default account admin with a null password.
D. The account is defined in the file /etc/ldap.secret.
E. The account is defined in the file /etc/ldap.root.conf.

A

B

277
Q

After modifying the indexes for a database in slapd.conf - and running slapindex - the slapd
daemon refuses to start when its init script is called. What is the most likely cause of this?
A. The indexes are not compatible with the init script.
B. The init script cannot be run after executing slapindex, without first signing the indexes with
slapsign.
C. The init script has identified one or more invalid indexes.
D. The init script is starting slapd as an ordinary user, and the index files are owned by root.

A

D

278
Q
Which option should be used to disable anonymous binds to your LDAP directory?
A. disallow bind_anon
B. disallow bind_anon_cred
C. disallow bind_simple_unprotected
D. disallow bind_simple
A

A

279
Q

Which slapd.conf directive defines the level of logging slapd will perform?

A

loglevel

280
Q

Which ONE of the following parameters is used in the database on a slave server to direct clients
that want to make changes to the LDAP database to the master server?
A. updatedn
B. updateserver
C. updateref
D. updateuri

A

C

281
Q

Which port number should be used to test LDAP Security Sockets Layer (SSL) traffic?

A

636

282
Q

When configuring LDAP to use certificates, which option should be used with the TLSVerifyClient
directive to ask the client for a valid certificate in order to proceed normally?
A. never
B. allow
CompTIA LX0-102 Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 84
C. try
D. demand

A

D

283
Q

Which configuration directive must be used in the example below to setup replication to a slave
server?
_____________ uri=ldaps://slave.example.com:636 binddn=”cn=Replicator,dc=example,dc=com”
bindmethod=simple credentials=secret

A

replica

284
Q
Which of the following parameters in slapd.conf are used to tune the database cache size?
(Choose TWO answers.)
A. dcachesize
B. dbcachesize
C. databasecachesize
D. cachesize
A

B, D

285
Q

In an LDAP slave’s slapd.conf configuration file, which parameter must match the binddn
parameter of the master server?

A

updatedn

286
Q

An administrator notices that searches are being processed sequentially and taking a long time to
complete. What should be done to speed up the searches?
A. Add the correct indexes in slapd.conf, stop the server and run slapindex.
B. Refine the search filter.
C. Use the -binarytreesearch option with ldapsearch.
D. Use the -fuzzy option with ldapsearch.

A

A

287
Q

Which command will instruct slurpd to process the replication error log in one-shot mode for the
server 192.168.0.3?
A. slurpd -r -h 192.168.0.3 -o
B. slurpd -r /path/to/replication/error/log -o
C. slurpd -r -o

A

B

288
Q
The following is an excerpt from a replication error log:
ERROR: No such attribute
replica: slave.example.com:389
time: 809618633
dn: uid=bjensen,dc=example,dc=com
changetype: modify
replace: description
description: A dreamer...
-
replace: modifiersName
modifiersName: uid=bjensen,dc=example,dc=com
-
replace: modifyTimestamp
modifyTimestamp: 20000805073308Z
-
What is the name of this file? (Enter only the file name and no path information.)
A

replog.slave.example.com:389.rej

289
Q
To restrict user authentication to ONLY users who belong to a specific organizational unit, which
file should be modified?
A. ldap.conf
B. pam_ldap.conf
C. pam.conf
D. /etc/pam.d/login
E. /etc/pam.d/ldap
A

A

290
Q
Which of the following tools are used to measure memory usage? (Select THREE correct
answers.)
A. mpstat
B. pstree
C. sar
D. top
E. vmstat
A

C, D, E

291
Q
When performing a capacity planning exercise, when would taking measurements be most
approriate?
A. During successful operation.
B. During an overload or an episode.
C. After an overload or an episode.
D. After replacing problematic hardware
A

A

292
Q
In the following output, what resource is the program being observed using the most?
A. CPU
B. memory
C. disk I/O
D. network I/O
A

B

293
Q
What operating system tools can be used to collect capacity planning data? (Select TWO correct)
A. fuser
B. iostat
C. lsmod
D. vmstat
A

B, D

294
Q
Which of the following tools are used to measure network I/O?
A. iostat
B. netstat
C. route
D. vmstat
A

B

295
Q

What is the goal of capacity planning? (Select THREE correct answers.)
A. Ensuring sufficient resources for growth.
B. Selecting a computer vendor.
C. Sizing computers for a specific load.
D. Diagnosing capacity problems.
E. Troubleshooting a software problem.

A

A, C, D

296
Q

In the following output, what does the 1 in the b column indicate?
A. A process is swapped and waiting.
B. A process is waiting.
C. A process is waiting on a parent to check its exit value.
D. A process is blocked on I/O.

A

D

297
Q
When investigating memory usage, what is the most important measurement for capacity planning
purposes?
A. Resident set size (RSS)
B. Total memory
C. Virtual memory size (VSZ)
D. Swap memory usage
A

A

298
Q
In the following output, what resource is the program being observed using the most?
A. CPU
B. memory
C. disk I/O
D. network I/O
A

C

299
Q
Which of the following resources would be measured for capacity planning? (Select TWO correct
answers.)
A. CPU usage
B. disk usage
C. application load time
D. memory usage
A

A, D

300
Q
In the following output, what was the maximum number of processes swapped out at any time?
A. 0
B. 1
C. 2
D. 8
E. 27
A

A

301
Q
What operating system tools can be used to collect capacity planning data? (Select TWO correct
answers.)
A. fuser
B. lsof
C. ps
D. top
A

C, D

302
Q
In capacity planning exercises, what tools assist in identifying processes of interest from other
processes? (Select TWO correct answers.)
A. acpid
B. lsof
C. pstree
D. w
A

B, C

303
Q
Which of the following are common Net::LDAP methods? (Choose THREE correct answers.)
A. bind
B. query
C. error
D. search
E. unbind
A

A, D, E

304
Q
The \_\_\_\_\_\_\_ Perl module gives the programmer the ability to work with LDIF files in Perl. (Specify
the module in Perl's Module::Submodule... format.)
A

Net::LDAP::LDIF

305
Q

The following excerpt is from a Perl script that reads a LDAP database and writes a LDIF file:
$ldap =Net::LDAP->new( ‘ldap.server.com’ ); $mesg = $ldap->bind( ‘cn=incadmin,o=inc’,
password => ‘secret’);[YOUR ANSWER GOES HERE] Net::LDAP::LDIF->new( *STDOUT,”w” )-
>write( $mesg->entries ); $mesg=$ldap->unbind; Which code snippet contains the correct query?
A. $mesg = $ldap->search(base => ‘o=inc’,);
B. $mesg = $ldap->search( base => ‘cn=incadmin,o=inc’, scope => ‘one’, filter => ‘(objectclass=)’
);
C. $mesg = $ldap->search( base => ‘o=inc’, scope => ‘sub’, filter => ‘(objectclass=
)’);
D. $mesg = $ldap->search( base => ‘o=inc’, recursive => ‘yes’, filter => ‘(*)’ );

A

C

306
Q

Which configuration option will enable SSL/TLS encryption when compiling OpenLDAP?

A

–with-tls

307
Q

An administrator is adding several LDIF files to the directory with slapadd, and the new entries are
not displayed when ldapsearch is used. Assuming that there is no database corruption, what is the
most appropriate solution to the problem?
A. Stop the slapd process and add the files again with slapadd.
B. Run slaprefresh_all.
C. Run ldaprefresh_all.
D. Stop the slapd process, run slapindex, and then correct the entries using slap_vacuum.

A

A

308
Q
Which command should be used to optimize LDAP searches?
A. ldapsearch -b sub
B. make /var/lib/openldap-data/
C. slapindex
D. slapd -r +20
E. slapd -instances=10 -f
A

C

309
Q

The ________ command, included with OpenLDAP, will generate password hashes suitable for
use in slapd.conf. (Enter the command with no options or parameters)

A

slappasswd

310
Q

What settings may a user enter when configuring Microsoft Outlook to connect to an LDAP white
pages service? (Choose THREE correct answers.)
A. Maximum number of entries to return on a successful search
B. SASL configuration
C. Search base
D. Search timeout
E. Alias dereferencing options

A

A. C. D

311
Q

What does the slapindex tool do?
A. Displays information about the currently configured indexes.
B. Regenerates indexes defined in slapd.conf
C. Displays only the DN of every entry in the directory, sorted by container.
D. Defragments the LDAP database files.

A

B

312
Q

Which command will perform a one-level search from the DN c=INC, for all entries whose
organization’s name begins with RioDeJaneiro?
A. ldapsearch -LLL -b “c=INC” “(o=description)” RioDeJaneiro*
B. ldapsearch -b “c=INC” -f “(o=description,cn=RioDeJaneiro%)”
C. ldapsearch -LLL -s one -b “c=INC” “(o=RioDeJaneiro*)”
D. ldapsearch -s sub -b “c=INC” -f “(o=RioDeJaneiro)(description)”

A

C

313
Q

Which of the following statements about the ldapsearch command are true? (Select THREE
correct answers.)
A. With the -x option, the simple bind authentication method will be used.
B. It is possible to configure a specific LDAP server for the search with the -h option.
C. The -b option specifies the database where the LDIF file will be included.
D. The -L option is useful when for viewing details of LDIF files.
E. The -Z option requires a successful StartTLS operation in order to continue.

A

A, B, D

314
Q

When importing the contents of one directory into another, the administrator is adding entries with
the slapadd command. Which of the following statements are true? (Choose THREE correct
answers.)
A. slapindex must be run after slapadd, because the slapadd operation will not write to index files.
B. The slapd process must be stopped before running slapadd.
C. All slave servers must be listed in the LDIF file for the entries to be replicated.
D. The changes in the LDIF file will not be replicated with slurpd.
E. slapstart must be run after creating the entries.

A

A, B, D

315
Q

The administrator wants to add the content from an LDIF file named example.ldif to the LDAP
directory. Which of the following commands will perform this task?
A. slapadd

A

A

316
Q
Which of the following resources would be measured for capacity planning? (Select TWO correct
answers.)
A. video driver performance
B. disk I/O
C. system boot time
D. network I/O
A

B, D

317
Q
In capacity planning exercises, what tools assist in identifying processes of interest from other
processes? (Select TWO correct answers.)
A. free
B. lshal
C. ps
D. top
A

C, D

318
Q
What operating system tools can be used to collect capacity planning data? (Select TWO correct
answers.)
A. netstat
B. route
C. sar
A

A, C

319
Q
What type of object class is sambaSamAccount?
A. structural
B. auxiliary
C. abstract
D. extended
A

B

320
Q

You are building a server which will authenticate users using the pam_ldap module. In addition to
possessing a valid account, you only want to allow logins by users who are members of a certain
group. Which parameter in ldap.conf will allow you to specify a filter string to be ANDed with the
login attribute when validating a user? (Enter only the parameter, without any options or values)

A

pam_filter

321
Q

After configuring a Unix workstation for LDAP authentication, you type the command ‘id joe’ and
discover that the user’s UID/GID information is still being retrieved from local password files.
Which file did you most likely forget to update?

A

nsswitch.conf

322
Q

Several mail clients do not support LDAP version 3 binding. If an installation of OpenLDAP rejects
version 2 binds by default, what line must be added to slapd.conf to support these clients?

A

allow bind_v2

323
Q

The _______ command is used to determine the NIS server to which your computer is currently
bound.

A

ypwhich

324
Q

Which of the following correctly describes the method to add Samba users to the LDAP directory?
A. First make sure that a posixAccount entry exists in the Directory for the user you want to add,
then use smbpasswd -a to add the Samba user from the command line.
B. Use the smbpasswd -a command to add the Samba user from the command line. This will add
all required information to the LDAP directory.
C. Create an LDIF file containing all required information, then use ldapadd to add the information
to the LDAP directory.
D. Create an LDIF file containing all required information, then use ldapmodd to add the Samba
related information to an existing posixAccount entry.

A

A

325
Q

In order to migrate usernames and passwords from a NIS server, the passwd and shadow files
were used with a custom script to import the data to OpenLDAP. After properly creating a test
workstation to authenticate against LDAP, the number of lines outputted from getent passwd are
different from the number on the NIS client workstation. Which one of the following statements can
be true?
A. The NIS database is not synchronized with passwd and shadow.
B. The OpenLDAP server creates some additional users that are shown in getent.
C. The NIS clients are not receiving the correct files from the server.
D. The NIS clients are confused since OpenLDAP and NIS use the same port to communicate.
E. The OpenLDAP client is querying the NIS server on the wrong TCP/IP port.

A

A

326
Q

When using the auth_ldap module with Apache 1.3, the log displays several messages containing
“protocol error”. Which of the following steps should be followed to fix the problem?
A. AuthLDAPStartTLS must be set to on.
B. LDAPv2 should be disallowed.
C. LDAPv3 should be allowed.
D. The Apache module must be turned on in slapd.conf.
E. The apache_auth.schema must be included in slapd.conf.

A

A

327
Q
In order for pam_ldap to be capable of changing a user's password in Active Directory, the
pam_password parameter must be set to
A. ad
B. win
C. active_directory
D. ldap
A

A

328
Q

After an administrator added comments to each line of the ACLs in slapd.conf, the ACLs ceased to
function properly. What is the most likely cause of this?
A. Comments cannot be used anywhere in an ACL block.
B. The comments were not added using the semi-colon (;) character.
C. Comments cannot be used in the slapd.conf file.
D. The comments were not added using the pound (#) character.

A

A

329
Q

OpenLDAP 2 requires an equality index on the objectClass attribute. What line in slapd.conf will
accomplish this? (Enter the entire line, separating fields with a single space)

A

index objectClass eq

330
Q
Which of the following ACL lines allows access to all hosts that have an IP address that starts with
192.168.1?
A. by peername=192.168.1.*
B. by peername=192.168.1.
C. by ipaddress=192.168.1.*
D. by ipaddress=192.168.1.
A

A

331
Q

Which one of the following pieces of information is not present in the slurpd replication log file?
A. A timestamp of when the modification took place.
B. The address of the remote LDAP slave server.
C. The name of the user who initiated the modification.
D. A timestamp of when the change has taken place on the slave.

A

D

332
Q

Which of the following procedures will test the TLS configuration of your LDAP server?
A. Run the ldapsearch command with the -ZZ option, while watching network traffic with a packet
analyzer.
B. Run the ldapsearch command with the -x option, while watching network traffic with a packet
analyzer.
C. Run the slapcat command, while watching network traffic with a packet analyzer.
D. Verify the TLS negotiation process in the /var/log/ldap_auth.log file.
E. Verify the TLS negotiation process in the /var/log/auth.log file.

A

A

333
Q

Specifying TLSVerifyClient = ________ in slapd.conf will instruct slapd to not ask the client for a
certificate.

A

never

334
Q

OpenLDAP is capable of using the ______ framework to provide integrity and confidentiality
protections.

A

ssl

335
Q
What does cachesize 1000000 represent in the slapd.conf file?
A. The number of entries to be cached.
B. The size of the cache in Bytes.
C. The size of the cache in bits.
D. The minimum cache size in Bytes.
E. The maximum cache size in Bytes.
A

A

336
Q

If no ACL lines are included in slapd.conf, what is the default behavior of slapd?
A. Allow anyone to read any entry.
B. Deny anyone from reading any entries.
C. Only certain attributes such as userPassword are protected from read access.
D. Access to the directory is only allowed from the local machine.

A

A

337
Q

The _______ command is used to create an index of the OpenLDAP database. (Please specify
the command with no path, options or parameters.)

A

slapindex

338
Q

It is found that changes made to an LDAP directory are no longer being replicated to the slave
server at 192.168.0.3. Tests prove that the slave server is listening on port 389 and changes are
being recorded properly to the replication log file. In which file would you find the replication
errors?

A

192.168.0.3:389.REJ

339
Q

It’s important to issue the Start TLS operation at the beginning of a session:
A. To compress any data sent over the network and improve performance.
B. To prevent usernames and passwords from being sent in plain text.
C. To ensure backward compatibility with older clients.
D. To prevent clients from binding to the server anonymously.

A

B

340
Q

You’re writing a simple Perl script to query an LDAP directory using the Net::LDAP module. Which
method would you use to determine if the start_tls() operation was successful?
A. err()
B. code()
C. result()
D. msg()

A

B

341
Q

LDAP is considered “lightweight” in comparison to X.500 because (Choose TWO correct
answers.)
A. It has a smaller set of operations.
B. The client and server communicate using the TCP/IP protocol stack.
C. The client and server communicate using the OSI protocol stack.
D. LDAP supports Access Control Lists and X.500 does not.

A

A, B

342
Q

Which one of the following is true about single sign-on?
A. Single sign-on is different than identity consolidation.
B. Single sign-on requires sending the same credentials to several services.
C. Single sign-on requires that the credentials for different services are distinct.
D. Single sign-on requires a smartcard.

A

A

343
Q
What schema files are required to make LDAP compatible to NIS? (Choose TWO correct
answers.)
A. misc.schema
B. cosine.schema
C. nis.schema
D. inetorgperson.schema
A

B, C

344
Q
Which of the following are valid choices for the LDAP database backend? (Choose THREE correct
answers.)
A. file
B. config
C. passwd
D. lbdm
E. shell
A

B, C, E

345
Q

When creating a multivalued RDN, what character is used to separate the two attribute values
used to form the RDN? (Enter only the character, as it would appear in an LDIF entry.)

A

+

346
Q
Which ONE of the following is a correct example of an RDN?
A. JohnDoe
B. cn=John Doe
C. cn=JohnDoe,ou=people,o=example
D. cn=John Doe, ou=people, o=example
A

B

347
Q
Which schema file is required by OpenLDAP?
A. inetorgperson.schema
B. core.schema
C. openldap.schema
D. cosine.schema
E. misc.schema
A

B

348
Q

An administrator has just configured an OpenVPN client. Upon starting the service, the following
message is displayed:
TLS Error: TLS key negotiation failed to occur within 60 seconds
Which of the following statements is true?
A. The client was unable to establish a network connection with the server.
B. The client was able to establish a network connection with the server, however TLS key
negotiation failed, resulting in a fallback to SSL.
C. The client was able to establish a network connection with the server, however TLS and SSL
security are not enabled.
D. The client was able to establish a network connection with the server, however TLS key
negotiation took longer than 60 seconds, indicating that there may be a problem with network
performance.

A

A

349
Q

SELinux has just been installed on a Linux system and the administrator wants to use SELinux in
permissive mode in order to audit the various services on the system. What command will switch
SELinux into permissive mode?
A. setenforce 0
B. /etc/init.d/selinux stop
C. selinux passive
D. /etc/init.d/selinux startpassive

A

A

350
Q
Which of the following export options, when specified in /etc/exports, will tell the server to use the
NFSv4 Pseudofilesystem?
A. fsid=2
B. fsid=0
C. fsid=3
D. fsid=1
A

B

351
Q

Which of the following are common techniques for securing a sendmail server? (Select THREE
correct answers)
A. Maintain user accounts in an LDAP directory.
B. Enable TLS.
C. Disable VRFY.
D. Run sendmail in a chroot’d environment.
E. Disable USRLKUP.

A

B, C, D

352
Q
What does ntop use for data collection?
A. Network packets
B. Log files
C. Frame relay
D. SNMP
A

A

353
Q

An administrator has successfully configured a cryptographic volume for dmcrypt, and has added
the following line to /etc/fstab:
/dev/mapper/cryptvol /media/crypt auto defaults 0 0
Upon booting the system, the error message “mount: special device /dev/mapper/cryptvol does
not exist” is displayed. What configuration file has the administrator forgotten to edit? (Provide the
full path and filename)

A

/etc/crypttab

354
Q

What command will remove the dmcrypt mapping named cryptvol? (Provide the command with
any options and parameters)

A

cryptsetup remove crypt-vol

355
Q

Which LUKS action, when supplied to the cryptsetup command, will initialize a LUKS partition and
set the initial key? (Provide only the action name)

A

luksFormat

356
Q

An administrator has created a mapping with the following command:
cryptsetup luksOpen /dev/sda1 cryptvol and has set three different keys. Which command below
will delete the first key?
A. cryptsetup luksDelKey /dev/sda1 0
B. cryptsetup luksDelKey /dev/sda1 1
C. cryptsetup luksDelKey /dev/mapper/cryptvol 1
D. cryptsetup luksDelKey /dev/mapper/cryptvol 0

A

A

357
Q

What command will list basic information about all targets available to cryptmount? (Provide the
command with any options or parameters)

A

cryptmount –l

358
Q
Which of the following are valid dmcrypt modes? (Choose THREE correct answers)
A. XTS
B. ESSIV
C. GMR
D. KWG
E. LRW
A

A, B, E

359
Q

Which directive in the OpenVPN client.conf specifies the remote server and port that the client
should connect to? (Provide only the directive, without any options or parameters)

A

remote

360
Q

You are certain that your kernel has been compiled with ACL support, however, when you try to
set an ACL on a file, you get the following output:
% setfacl m user:hugh:r afile.txt
setfacl: afile.txt: Operation not supported
What is the most likely reason for this problem?
A. There is an error in the command line parameters.
B. There is no user on the system named hugh.
C. The partition has not been mounted with the acl option.
D. The file afile.txt doesn’t exist.

A

C

361
Q
Which of the following are valid OpenVPN authentication modes? (Choose TWO correct answers)
A. S/Key
B. Kerberos
C. Static Key
D. Password
E. TLS
A

C, E

362
Q

What is true about the permissions for the file afile given the following output from getfacl? (Select
TWO correct answers)
% getfacl afile
# file: afile
# owner: matt
# group: support
user::rwx
user:hugh:rw
group::r
group:staff:rx
mask::rwx
other::r
A. Anyone in the support group will be able to read and execute the file.
B. The user hugh will be able to read the contents of the file.
C. Anyone in the users group will be able to read the file.
D. The user matt will not be able to edit this file.
E. Anyone in the staff group will be able to read and execute the file.

A

B, E

363
Q
You wish to revoke write access for all groups and named users on a file. Which command will
make the correct ACL changes?
A. setfacl x group:*:rx,user:*:rx afile
B. setfacl x mask::rx afile
C. setfacl m mask::rx afile
D. setfacl m group:*:rx,user:*:rx afile
A

C

364
Q

What is the default UDP port for OpenVPN traffic?

A

1194

365
Q

When adding additional users to a file’s extended ACLs, what is true about the default behaviour
of the ACL mask for the file?
A. The mask is modified to be the union of all permissions of the file owner, owning group and all
named users and groups.
B. The mask is left unchanged.
C. If required, a warning is printed indicating that the mask is too restrictive for the permissions
being granted.
D. The mask is modified to be the union of all permissions of the owning group and all named
users and groups.

A

D

366
Q

In which of the following scenarios MUST an administrator use ethernet bridging instead of routing
when configuring an OpenVPN site? (Select TWO correct answers)
A. Some OpenVPN clients will be installed on laptops and must be able to connect from different
locations.
B. NetBIOS traffic must be able to traverse the VPN without implementing a WINS server.
C. The IPv4 protocol is required.
D. It will be necessary to use an MTU setting other than the default.
E. The IPX protocol is required.

A

B, E

367
Q

Linux Extended Attributes include attribute classes. Which of the following are included in the
defined attribute classes? (Select THREE correct answers)
A. default
B. system
C. owner
D. trusted
E. user

A

B, D, E

368
Q

Which of the following statements are true about Linux Extended Attributes on files? (Select TWO correct answers)
A. An attribute value may be empty.
B. Attribute storage counts toward disk quota use.
C. Attribute use is enabled by mounting a partition with the attr option.
D. An attribute is file, not inode, specific. Thus, a hard linked file in two locations could have
different attributes.
E. Attributes are not used by SELinux and other kernel security modules.

A

A, B

369
Q

Which command will set the user.author attribute on the file afile.txt?
A. setfattr user.author:”A. Author” afile.txt
B. setfattr n user.author v “A. Author” afile.txt
C. setfattr user.author=”A. Author” afile.txt
D. setfattr a user.author=”A. Author” afile.txt

A

B

370
Q
Which of the following lines in the OpenVPN server.conf file will supply a DNS server for DHCP
clients to use?
A. push "dhcpoption DNS 10.142.232.4"
B. push "dhcp DNS 10.142.232.4"
C. push "options DNS 10.142.232.4"
D. push "dhcpoptions DNS 10.142.232.4"
A

A

371
Q
Which command will list all of the extended attributes on the file afile.txt along with the values?
A. getfattr all afile.txt
B. getfattr afile.txt
C. getfattr list afile.txt
D. getfattr dump afile.txt
A

D

372
Q

Which of the following statements is true when querying the extended attributes of a file that has
no extended attributes set?
A. getfattr will print a warning and exit with a value of 0.
B. getfattr will print a warning and exit with a value of 1.
C. No output will be produced and getfattr will exit with a value of 0.
D. No output will be produced and getfattr will exit with a value of 1.

A

C

373
Q

Which directive must be set to 0 in a host or service definition to prevent Nagios from sending
more than one alert for a particular event? (Specify only the directive without any options or
parameters).

A

notification_interval

374
Q

What is the purpose of the Safe Checks option in a Nessus configuration?
A. Enables secure scanning over an encrypted tunnel.
B. To prevent the use of plugins which may have a negative effect on the network being scanned
C. To prevent the use of plugins which may leave the Nessus server vulnerable during the
scanning process
D. When validating a Nessus configuration file, the nessusd process will not be interrupted.

A

B

375
Q

In Nessus, what does the acronym NASL stand for?

A

Nessus
Attack Scripting
Language

376
Q

An administrator is capturing traffic with Wireshark and is only seeing ARP traffic. What is the most
likely cause of this?
A. The network interface on which the scan is running is not in promiscuous mode.
B. The machine is on a switched network and is therefore only seeing local and
broadcast/multicast packets.
C. The administrator did not enable the TCP and UDP options when starting the scan.
D. The network interface on which the scan is running has the ARP_ONLY flag set.

A

B

377
Q

Which statements are true of the following Wireshark capture filter:
(tcp[2:2] > 1500 and tcp[2:2] 1500 and tcp[4:2]

A

C, E

378
Q

The command ‘nmap sS O 10.142.232.10’ produces the following output:
PORT STATE SERVICE
631/tcp open ipp
3306/tcp open mysql
Which of these statements are true? (Select TWO correct answers)
A. A simple scan was launched.
B. The scan was executed by the root user.
C. Output will be sent to a file instead of stdout.
D. A stealth SYN scan was launched.
E. There are no other services running on this machine

A

B, D

379
Q

Which of the following can be done to secure a BIND server? (Select THREE correct answers)
A. Run the BIND daemon as a nonroot user.
B. Configure ACLs.
C. Require clients to authenticate with a password before querying the server.
D. Run the BIND daemon in a chroot jail
E. Encrypt DNS traffic using SSL/TLS.

A

A, B, D

380
Q
DNS servers are vulnerable to which of the following attacks? (Select THREE correct answers)
A. Cache Poisoning
B. Fork Bomb Attack
C. PasswordBased Attack
D. ManintheMiddle
E. Smurf Attack
A

A, D, E

381
Q

Which tool, distributed with BIND 9, will check the syntax of a named configuration file? (Supply
only the program name, without any options or parameters)

A

named-checkconf

382
Q

The apache administrator has added the following lines to the configuration files:

AllowOverride None

What is the purpose of this directive?
A. It stops users from serving HTML files from their home directories.
B. It prevents HTML files from being served out of the / directory.
C. It stops users from setting up .htaccess files unless specifically allowed in additional
configuration.
D. It prevents CGI scripts from modifying apache features dynamically.

A

C

383
Q

What command is used to create and maintain a Basic Authentication password file for apache?
(Specify only the command, with no path or arguments)

A

htpasswd

384
Q

SELinux is a Linux feature that:
A. monitors system file access by unprivileged users and warns them when they are trying to gain
access to files beyond their permission levels set in the Mandatory Access Control policies.
B. provides only Mandatory Access Control policies. Additional access control models such as
Rolebased access control require additional tools to implement.
C. enforces Mandatory Access Control policies that can restrict user space programs and system
servers to the minimum amount of privilege required to operate correctly.
D. ensures that system files referenced in the Mandatory Access Control policies are not modified
and alerts administrators when changes occur.

A

C

385
Q

Which of the following statements are advantages that Mandatory Access Control has over
Discretionary?
Access Control models? (Select TWO correct answers)
A. MAC policies are easier to configure than use of DAC.
B. MAC adds the concept of privileged remote users which is not available with simple DAC.
C. MAC policies increase the ability of the root user to correct errors.
D. MAC lets the kernel help decide if an object, such as a device or process, can access another
object.
E. Trust is placed in the administrators and not in individual users.

A

D, E

386
Q

What are the steps which must be followed to enable serverwide zone transfers between two
BIND 9 servers securely using TSIG?
A. Generate a key, specify the public key in the named configuration on both servers, create a
server statement in the named configuration on both servers.
B. Generate a key, specify the private key in the named configuration on both servers, create a
server statement in the named configuration on both servers.
C. Generate a key, specify the private key in the named configuration on one server and the public
key in the named configuration on the other, create a remote statement in the named configuration
on both servers.
D. Generate a key, specify the private key in the named configuration on one server and the public
key in the named configuration on the other, create a server statement in the named configuration
on both servers.

A

B

387
Q
Under which path is the selinux pseudofilesystem found?
A. /dev/selinux
B. /sys/selinux
C. /selinux
D. /var/selinux
E. /proc/selinux
A

C

388
Q

With SELinux, what is the command that is used for changing the context of a file? (Specify the
command only, with no path information or arguments)

A

chcon

389
Q

An unprivileged user issued a command which produced the following log message:
avc: denied { getattr } for pid=984 exe=/usr/bin/vim path=/etc/shadow dev=03:01 ino=134343
scontext=hugh:user_r:user_t tcontext=system_u:object_r:shadow_t tclass=file
What does the message mean?
A. User hugh was not running in a security context that permitted reading the file.
B. User hugh only needs to switch to the object_r role in order to edit /etc/shadow.
C. The security context for hugh is misconfigured and needs access to read any system file.
D. User hugh was not running in a security context that permitted writing to the file.

A

A

390
Q

When a user logs into a system using SSH, what is the format of SELinux security context which
will assign the user_r role and the user_t domain to their login sessions?
A. user_r:user_t system_r:sshd_t
B. sshd_t:system_r user_t:user_r
C. system_r:sshd_t user_r:user_t
D. user_t:user_r sshd_t:system_r

A

C

391
Q

How are SELinux permissions related to standard Linux permissions?
A. SELinux permissions override standard Linux permissions.
B. Standard Linux permissions override SELinux permissions.
C. SELinux permissions are verified before standard Linux permissions.
D. SELinux permissions are verified after standard Linux permissions.

A

D

392
Q

A user that is allowed to use the su command under SELinux is also allowed to switch from the
user role to the sysadmin role. What command will run a new shell for the user in the new context?
(Specify the command only, with no path, options or arguments)

A

newrole

393
Q

What is the difference between an SELinux domain and an SELinux type?
A. A domain is a group of SELinux types.
B. A domain defines the range of access that an object has. A type is used to define an access
level.
C. A domain is assigned to processes while a type is assigned to objects such as files and
directories.
D. A domain is an alternative keyword for type.

A

C

394
Q

An SELinux security context is required to ensure that all files in /opt have the default context of
system_u:object_r:usr_t. How should the corresponding configuration entry be formatted?
A. system_u:object_r:usr_t /opt/*
B. /opt/.* system_u:object_r:usr_t
C. /opt/* system_u:object_r:usr_t
D. system_u:object_r:usr_t: /opt/.*
E. system_u:object_r:usr_t /opt/.*

A

B

395
Q

Specifying the ___________ parameter in sshd_config will allow the administrator to
systematically provide access to certain user accounts by name.

A

AllowUsers

396
Q

An administrator can prevent dictionary based attacks against an OpenSSH server by forcing
keybased authentication with which TWO parameters in sshd_config?
A. PasswordAuthentication
B. HostKey
C. PrivatekeyAuthentication
D. PubkeyAuthentication
E. ServerKey

A

A, D

397
Q

A user is attempting to connect to a remote server via SSH and receives the following message:
The authenticity of host ‘mail.example.com (208.77.188.166)’ can’t be established.
RSA key fingerprint is 92:32:55:e9:c4:20:ae:1b:2c:d7:91:40:90:89:1c:ad.
Are you sure you want to continue connecting (yes/no)?
What does this indicate?
A. The RSA key fingerprint was found in the SpamCop database, indicating that the remote host is
a known spammer.
B. The user’s SSH client was unable to connect to the remote host’s authentication agent for
verification.
C. The user’s SSH client is incompatible with the server’s RSA key.
D. The server’s SSH host key cannot be found in the list of known hosts.

A

D

398
Q

A user is attempting to connect to a remote host via SSH and following message is displayed:
Host key verification failed.
Which of the following options could resolve the problem? (Select TWO correct answers)
A. Add the o StrictHostKeyChecking=no option to the command.
B. Enable the PasswordAuthentication parameter on the remote host.
C. Generate new SSH host keys on the remote host.
D. Generate a new private key which is compatible with the server’s host key.
E. Update the remote host’s SSH host key in the list of know hosts.

A

A, E

399
Q

Where is the global list of known SSH host keys located? (Supply the full path and filename)

A

etc/ssh/ssh_known_hosts

400
Q
Which of the following are valid NFSv4 security types?
A. RSA
B. SSL
C. SPKM
D. Kerberos
E. LIPKEY
A

C, D, E

401
Q

Which GPG command is used to sign a public key? (Select TWO correct answers)
A. gpg signpublickey UID
B. gpg signkey UID
C. gpg sign UID
D. gpg editkey UID followed with the sign command.
E. gpg editkey UID followed with the confirm command.

A

B, D

402
Q
Which GPG command will publish a public key to a public key server?
A. gpg exportkeys UID
B. gpg publishkeys UID
C. gpg sendkeys UID
D. gpg pushkeys UID
A

C

403
Q

Which GPG command is used to create a revocation certificate in case a GPG key ever needs to
be cancelled?
A. gpg genrevoke name
B. gpg editkey name followed with the revoke command.
C. gpg revoke name
D. gpg createrevoke name

A

A

404
Q

Which command is used to add an additional name, email address and comment to an existing
private key?
A. gpg editkey name followed with the adduid command.
B. gpg addsubkey name
C. gpg addalias name
D. gpg genalias name

A

A

405
Q

Someone who wishes to receive an encrypted file has provided a key UID and a key fingerprint for
verification to the data sender. Assuming that this key is on a public keyserver, what command will fetch the public key from the server?
A. gpg findkeys UID
B. gpg recvkeys UID
C. gpg getkeys UID
D. gpg refreshkeys UID

A

B

406
Q
You have downloaded a file named file.tgz along with a signature file named file.tgz.asc. Which commands can be used to verify that file.tgz has not been tampered with since the file creator
created the signature?
Assume that you have already retrieved the public key of the file creator. (Select THREE correct
answers)
A. gpg verify file.tgz.asc file.tgz
B. gpg verify file.tgz
C. gpg verify file.tgz.asc
D. gpgv verify file.tgz.asc
E. gpgv file.tgz.asc
A

A, C, E

407
Q
By default, when verifying a signed file or a file with a detached signature, which keyring is used to search for public keys?
A. ~/.gnupg/trustdb.gpg
B. ~/.gnupg/secring.gpg
C. ~/.gnupg/trustedkeys.gpg
D. ~/.gnupg/pubring.gpg
A

C

408
Q

Which utility is used for retrieving, setting, and removing NFSv4 ACLs? (Supply only the command
name, with no options or parameters)

A

nfs4acl

409
Q

An administrator has just configured vsftp and notices that she cannot follow symbolic links when connected to the FTP server. What is the most likely reason for this?
A. The follow_symlinks=no option has been set in vsftpd.conf.
B. vsftpd is running in a chroot environment.
C. This installation of vsftpd was not compiled with support for symbolic links.
D. The user account she is connecting with is not listed in /etc/security/ftpusers.

A

B

410
Q

Which parameter in vsftp.conf will restrict users to their home directory? (Supply only the
parameter name, with no options or values)

A

chroot_local_user

411
Q

What is one of the primary claimed benefits of Smack over SELinux?
A. Smack implements Rule Set Based Access Control. SELinux doesn’t support this model.
B. SELinux has export restrictions placed on it by the NSA.
C. Configuration of Smack is much more simple.
D. Smack allows users to share files without administrator intervention.

A

C

412
Q

How does AppArmor configure its access control settings?
A. AppArmor does not require any configuration.
B. AppArmor inspects the Linux system to determine which applications are installed and configures itself. This configuration can then be modified manually.
C. AppArmor relies on precompiled policies. These policies are updated with new releases or can
be downloaded periodically.
D. A profile is assigned per application that specifies the system resources available to the
application.

A

D

413
Q
Which of the following is NOT and valid scan technique with nmap?
A. Window
B. SYN
C. ACK
D. Connect()
E. RST
A

E

414
Q

Postfix daemons can be chroot’d by setting the chroot flag in ____________. (Supply only the
filename, without a path)

A

master.cf

415
Q

What can proxymap be used for in a Postfix installation? (Select TWO correct answers)
A. Consolidating the number of open lookup tables.
B. Creating and querying Postfix alias databases.
C. Mapping mail user IDs to system accounts.
D. Overcoming chroot restrictions.
E. Creating and querying Postfix lookup tables

A

A, D

416
Q

Which of the following parameters should be set in main.cf to enable TLS in Postfix?
A. smtpd_tls_cert_file, smtpd_tls_key_file, smtpd_tls_CAfile, smtpd_use_tls
B. smtpd_tls_key_file, smtpd_tls_CAfile, smtpd_use_tls, smtpd_tls_pem_file
C. smtpd_tls_CAfile, smtpd_use_tls, smtpd_tls_pem_file, smtpd_tls_cert_file
D. smtpd_use_tls, smtpd_tls_pem_file, smtpd_tls_cert_file, smtpd_tls_key_file

A

A

417
Q
The system administrator wishes to use John the Ripper to confirm that the passwords in a file called passwords are not weak. john has finished but the terminal window running the program has closed. What command can be used to list any cracked passwords for this file?
A. john list passwords
B. john list
C. john show
D. john show passwords
A

D

418
Q
On a new Linux system, the root user is being asked to provide the root user password before being able to use the su command. What line in the /etc/pam.d/su file will allow root to use su without supplying passwords?
A. auth required pam_norootpw.so
B. auth sufficient pam_norootpw.so
C. auth required pam_rootok.so
D. auth sufficient pam_rootok.so
A

D

419
Q
The system administrator wishes to use the pam_listfile.so module to restrict which users are allowed to login via SSH. Which line will configure this behaviour?
A. auth required pam_listfile.so item=user sense=deny file=/etc/sshd/sshd.deny onerr=succeed
B. auth required pam_listfile.so item=user sense=allow file=/etc/sshd/sshd.allow onerr=succeed
C. auth required pam_listfile.so item=user sense=allow file=/etc/sshd/sshd.allow onerr=fail
D. auth required pam_listfile.so item=user sense=deny file=/etc/sshd/sshd.deny onerr=fail
A

C

420
Q
Which of the following is NOT included in a Snort rule header?
A. protocol
B. action
C. source IP address
D. packet byte offset
E. source port
A

D

421
Q

What is the purpose of snort inline?
A. To run the snort daemon without forking child processes.
B. To have iptables use snort rules to filter packets.
C. To have snort log suspicious activity only, without performing any actions
D. To run the snort daemon as a nonroot user.

A

B

422
Q

What is the purpose of tripwire?
A. To act as a honeypot and attract attackers.
B. To enforce mandatory access control policies to confine users to the minimum amount of
privilege required.
C. To monitor a server for breakin attempts and, if desired, ban the IP address.
D. To identify changes to critical system files and directories.

A

D

423
Q

Which of the following commands will create a new, signed tw.pol file?
A. twadmin createpolfile e S mykey.key /etc/tripwire/twpol.txt
B. twadmin createcfgfile S mykey.key /etc/tripwire/twpol.txt
C. twadmin createpolfile S mykey.key /etc/tripwire/twpol.txt
D. twadmin createcfgfile e S mykey.key /etc/tripwire/twpol.txt

A

C

424
Q

What openssl command will generate a private RSA key of 2048 bits and no passphrase?
A. openssl genrsa des3 out privkey.pem 2048
B. openssl genrsa out privkey.pem 2048
C. openssl genrsa nopass out privkey.pem 2048
D. openssl genrsa nopass des3 out privkey.pem 2048

A

B

425
Q

What openssl command will generate a certificate signing request (CSR) using the private key file privkey.pem?
A. openssl req key privkey.pem out cert.csr
B. openssl req new key privkey.pem out cert.csr
C. openssl gencsr key privkey.pem out cert.csr
D. openssl gencsr new key privkey.pem out cert.csr

A

B

426
Q

What openssl command will generate a selfsigned test certificate?
A. openssl req new x509 key privkey.pem out cacert.pem days 365
B. openssl sign key privkey.pem out cacert.pem days 365
C. openssl req key privkey.pem out cacert.pem days 365
D. openssl sign new x509 key privkey.pem out cacert.pem days 365

A

A

427
Q
Which openssl command is used to inspect the information stored in a certificate?
A. x509
B. show
C. info
D. req
A

A

428
Q

The openssl command can be used to test connections with various secure services. What command will open a connection with a remote POP3S (POP3 over SSL) server?
A. openssl connect host pop.example.com:pop3s
B. openssl connect pop.example.com:pop3s
C. openssl s_client connect pop.example.com:pop3s
D. openssl s_client pop.example.com:pop3s

A

C

429
Q
Which of the following rule directives will email kevin@example.com and matt@example.com
when the Mail Configuration rule is violated?
A. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = kevin@example.com,
emailto = matt@example.com
)
B. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = kevin@example.com,matt@example.com
)
C. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = kevin@example.com;matt@example.com
)
D. (
rulename = "Mail Configuration",
severity = $(SIG_HI),
emailto = kevin@example.com,
emailcc = matt@example.com
)
A

C

430
Q

Which of the following methods can be used to deactivate a rule in Snort? (Select TWO correct answers)
A. Place a # in front of the rule and restart snort.
B. Write a pass rule in local.rules and restart snort with the o option.
C. Delete the rule and snort will automatically reread its rules files within five minutes.
D. Add the rule to /etc/snort/rules.deactivated and it will take effect immediately

A

A, B

431
Q
The system administrator is keeping local configuration file changes in RCS. What command will commit the file to RCS revision control AND keep a local, unlocked copy of the latest version of
the file?
A. ci file
B. rcs commit file
C. rcs o file
D. ci u file
A

D

432
Q

There is a configuration file being managed by RCS. Based on timestamps, it appears that someone has modified the file without checking it into RCS. What command can be used to
compare the configuration file with the latest committed version? (Specify the command only, no
path or argument information)

A

rcsdiff

433
Q

What is an SO rule in the context of Snort?
A. A loadable snort module.
B. A rule which can be written in the Perl programming language.
C. A simple object.
D. A snort overflow

A

A

434
Q
Which of the following are valid ntop deployment scenarios? (Select THREE correct answers)
A. Public Site
B. Switched Gateway
C. Simple Host
D. Border Gateway
E. Mirror Line
A

C, D, E

435
Q

In the Puppet centralized configuration management tool, a manifest is:
A. a list of all target configurations
B. a configuration document that describes the target configuration and the steps required to achieve it
C. a list of all files related to a configuration target
D. a list of the important services on a target configuration

A

B

436
Q
What is the syntax error in the following simple Puppet configuration file?
class test_class {
file { "/tmp/test.txt":
mode => 600,
owner => root,
group => root
}
}
# Define the node
node testclient {
isa test_class
}
A. Comments begin with // character and not a #.
B. The colon (:) after /tmp/test.txt should be a semicolon (;).
C. class, node and file sections require a semicolon (;) at the end of their definitions.
D. isa should be include.
A

D

437
Q
Which of the following are valid Nagios objects? (Select THREE correct answers)
A. Contacts
B. Commands
C. Host Groups
D. Notification Groups
E. Programs
A

A, B, C

438
Q

Which of the following are common techniques for securing Nagios? (Select THREE correct answers)
A. Require authentication for access to the CGI scripts.
B. Run Nagios in a chroot jail.
C. Compile Nagios with the enabletls option.
D. Do not run as the root user.
E. Disable external commands.

A

A, D, E

439
Q
Which of the following is not an iptables rule set?
A. chain
B. mangle
C. filter
D. nat
A

A

440
Q
Which of the following are builtin chains for the iptables nat table? (Select THREE correct answers)
A. OUTPUT
B. INPUT
C. PROCESSING
D. POSTROUTING
E. PREROUTING
A

A, D, E

441
Q
Which syslog configuration line will send out logged messages to a remote syslog server?
A. *.* host:remotehost
B. *.* remote remotehost
C. *.* @remotehost
D. *.* host=remotehost
A

C

442
Q
Which option is required to syslogd in order for it to accept remote log messages?
A. s
B. r
C. remote
D. l
A

B

443
Q

What does the following iptables rule accomplish:
iptables A INPUT s 208.77.188.166 j DROP
A. Forwards all incoming traffic to the host 208.77.188.166.
B. Accepts all traffic from 208.77.188.166.
C. Nothing, there is a syntax error.
D. Drops all traffic from 208.77.188.166

A

D

444
Q

What does the following iptables rule accomplish:
iptables A INPUT s 208.77.188.166 d 10.142.232.1 p tcp dport 22 j ACCEPT
A. Accepts traffic on port 22 only from the hosts 208.77.188.166 and 10.142.232.1.
B. Forwards all requests from the host 10.142.232.1 on port 22 the internal host 208.77.188.166
C. Forwards all requests from the host 208.77.188.166 on port 22 the internal host 10.142.232.1
D. Drops traffic on port 22 only from the hosts 208.77.188.166 and 10.142.232.1.

A

C

445
Q

What does the following iptables rule accomplish:
iptables A INPUT d 10.142.232.1 p tcp dport 20:21 j ACCEPT
A. Forwards all traffic not on port 20 or 21 to the host 10.142.232.1.
B. Drops all traffic coming from the host 10.142.232.1 destined for port 20 or 21.
C. Accepts all traffic from the host 10.142.232.1 destined for port 20 or 21.
D. Forwards all traffic on port 20 and 21 to the host 10.142.232.1.

A

D

446
Q

What does the following iptables rule accomplish:
iptables A INPUT s !127.0.0.0/8 p tcp dport 111 j DROP
A. Drops all packets from the LAN destined for port 111.
B. Drops all packets originating from the local machine unless they are destined for port 111.
C. Drops all packets destined for port 111 which originate from the local machine.
D. Drops all packets destined for port 111 unless they are from the local machine

A

D

447
Q

The local system administrator has created a configuration entry for apache version 2 that isn’t working. What is wrong with the following configuration?

AuthName Members
AuthType Basic
AuthUserFile /www/passwd

A. The directive require validuser is missing.
B. Basic Authentication has been removed from Apache 2.x.
C. The format of the password file is not specified.
D. The AuthUserFile must be in the apache configuration directory.

A

A

448
Q

In apache configuration which directives are used to restrict access based on host/domain name and IP address?
A. restrict and allow
B. order, allow from and deny from
C. deny and accept
D. allow IP, deny IP, allow DOMAIN and deny DOMAIN
E. order, deny and accept

A

B