Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Linux Security

Last Update 19 hours ago Total Questions : 51

The Linux Security content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include 212-77 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 212-77 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-77 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Linux Security practice test comfortably within the allotted time.

Question # 11

You want to allow Linux users running StarOffice to directly edit files stored on a

Windows 2000 SMB/CIFS file server. Which of the following would you use to enable this?

A.

Linux's standard NFS file sharing support

B.

The Linux smbclient program

C.

An FTP server running on the Windows system

D.

The Linux smbmount program

Question # 12

You want to know how long each user's session was the last time they logged on.

Which of the following log files contains this information?

A.

/var/log/utmp

B.

/var/log/usrlog

C.

/var/log/wtmp

D.

/var/log/lastlog

Question # 13

You inadvertently change the permission block on /usr/bin/passwd command to

-r-xr-xr-x.

What would be the effect of this change?

A.

No changes in how the command runs would occur.

B.

Users could no longer change their passwords because they do not have write permissions to /etc/passwd.

C.

Users' passwords would not expire.

D.

Shadow passwords would quit working.

Question # 14

A computer is chained firmly to the wall, all of its accounts are secured with good shadowed passwords, and it's configured to boot only from its hard disk, but the system has no BIOS or boot loader password. No users are currently logged into this system. How might a malicious individual without an account on this system corrupt it if given a few minutes alone with it? (Choose two)

A.

The intruder could reboot it, reconfigure it to boot from floppy, boot a DOS floppy, and use DOS's disk utilities to delete the Linux partitions and erase the hard disk.

B.

The intruder could open the case, remove the hard disk and insert it in another computer, then modify the configuration files and return the hard disk to the original machine.

C.

The intruder could run a password-cracking program on the system's /etc/passwd file, thus obtaining all the user's passwords for use in further compromising the system at a later date.

D.

The intruder could utilize a bug in su, passwd, or some other SUID root program to acquire root privileges and then alter the system's configuration files.

Question # 15

Which of the following is a correct entry in the /etc/hosts file?

A.

search the-nashes.net

B.

10.254.90.135 deedee.the-nashes.net

C.

deedee 10.254.90.135/ip

D.

nameserver 10.254.90.131

Go to page: