1.
Which of the following is a correct entry in the /etc/hosts file?
2.
Youre planning the setup of a Linux computer as a server on your organizations network. Which of the following is consistent with best practices for documentation?
3.
What is the name of the file that contains encrypted hashes of passwords on a Linux system?
4.
As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory. Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?
5.
On Linux systems, how can root logins be restricted?
6.
How can you best see how much free space you have in your current directory?
7.
Which of the following steps would not substantially improve security over the typical Linux installation to a computer with typical hardware and settings?
8.
One of your users says that she changed her umask to 664, but now her new files all have a permission block of ---x--x-w-. If she wanted her new files to have a permission block of -rwrw- r--, what should she have used as a umask?
9.
Why is a log file analysis tool like Logcheck useful?
10.
Youve installed a new application on a test computer. During testing, youve run into a number of problems that you are unable to troubleshoot. Where should you look first for help?