Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?
A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd
One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?
A. Someone is using your Web site to test their connectivity to the Internet.
B. Someone is using a DoS attack on your Web site.
C. There is no problem; this is normal traffic from DNS servers and Internet routers checking connectivity to your Web site.
D. There is insufficient capacity on the Internet connection to your Web site.
A user is logged into the Linux workstation, what is the best way to login to root from a shell prompt?
A. chuser root
B. root
C. login root
D. su
What is the name of the file that contains encrypted hashes of passwords on a Linux system?
A. /etc/shadow
B. /etc/.passwd
C. /etc/passwd
D. /.secure/.htaccess
Which file contains the name servers to be used by the local machine for hostname resolution?
A. /etc/services/
B. /etc/hosts
C. /etc/resolv.conf
D. /etc/network/interfaces
Page 1 out of 6 Pages |