1.
Which of the following is true of Linux passwords?
2.
Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?
3.
Under the bash shell which is the most appropriate place to set environment variables that apply to all users?
4.
Which of the following measures is the most effective way to prevent attacks through various network services?
5.
Which of the following statements applies to the IP address 192.168.0.1?
6.
Which of the following are ways to disable dynamic routing?
7.
Which of the following is not a Linux DHCP client?
8.
How should you engage users in helping to secure your computer's passwords?
 
9.
You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information?
10.
Which statement describes the cron daemon?