Luiz  Eduardo
Quiz von , erstellt am more than 1 year ago

LPI QUESTIONS

57
0
0
Luiz  Eduardo
Erstellt von Luiz Eduardo vor mehr als 5 Jahre
Schließen

UNIX QUESTIONS 1

Frage 1 von 60

1

When connecting to an SSH server for the first time, its fingerprint is received and stored in a file, which is located at:

Wähle eine der folgenden:

  • ~/ .ssh/fingerprints

  • ~/ .ssh/id_dsa

  • ~/ .ssh/known_hosts

  • ~/ .ssh/id_dsa.pub

  • ~/ .ssh/gpg.txt

Erklärung

Frage 2 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Where is the user foo’s procmail configuration stored, if home directories are stored in /home? Please enter the complete path to the file

Erklärung

Frage 3 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Postfix daemons can be chroot’d by setting the chroot flag in . (Supply only the filename, without a path)

Erklärung

Frage 4 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

What is the default location for sendmail configuration files? (Please provide the complete path to the directory

Erklärung

Frage 5 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

What command is used to print NFS kernel statistics? (Provide the command with or without complete path)

Erklärung

Frage 6 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

What is the name of the module in Apache that provides the HTTP Basic Authentication functionality? (Please provide ONLY the module name)

Erklärung

Frage 7 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

In which directory can all parameters available to sysctl be found? (Provide the full path)

Erklärung

Frage 8 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

This program has 3 operating modes: copy-in mode, copy-out mode, and copy-pass mode, and is used to copy files into or out of archives. What program is this?
(Please provide the command name only, with no arguments or path.)

Erklärung

Frage 9 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

The command -x foo will delete the user foo from the Samba database. (Specify the command only, no path information.)

Erklärung

Frage 10 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

What postfix configuration setting defines the domains for which Postfix will deliver mail locally? (Please provide only the configuration setting name with no other information

Erklärung

Frage 11 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

What is the path to the global postfix configuration file? (Please specify the complete directory path and file name

Erklärung

Frage 12 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Which Samba-related command will show all options that were not modified using smb.conf and thus are set to their default values? Please enter the command and its parameter(s):

Erklärung

Frage 13 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Which site-specific configuration file for the shadow login suite must be modified to log login failures? Please enter the complete path to that file._

Erklärung

Frage 14 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

You are not sure whether the kernel has detected a piece of hardware in your machine. What command, without options or parameters, should be run to present the contents of the kernel ring-buffer?

Erklärung

Frage 15 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

You have installed some new libraries, but these are not available to programs and are not listed by lconfig -p. What file should the path to the libraries be added to, before running ldconfig?

Erklärung

Frage 16 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

nfsd, portmap and daemons must be running on an NFS server.

Erklärung

Frage 17 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

With which parameter in the smb.conf file can a share be hidden?

Erklärung

Frage 18 von 60

1

Please enter the complete command to create a new password file for HTTP basic authentication (/home/http/data/web _passwd) for user john.
htpasswd -c /home/http/data/web_passwd john

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 19 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Please enter the command used to remove Kerberos tickets from the cache below.

Erklärung

Frage 20 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

All machines outside the network are able to send emails through the server to addresses not served by that server. If the server accepts and delivers the email, then it is a(n) . Please enter the English term, without any punctuation.

Erklärung

Frage 21 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Which command can be used to save the current iptables rules into a file? Please enter only the command without path or parameters.

Erklärung

Frage 22 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Which file on a Postfix server modifies the sender address for outgoing e-mails? Please enter only the file name without the path.

Erklärung

Frage 23 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Running tcpdump -nli eth1 ‘icmp’ shows the following output:
11:56:35.599063 IP 192.168.123.5 > 194.25.2.129: icmp 64: echo request seq 1
11:56:35.670910 IP 194.25.2.129 > 192.168.123.5: icmp 64: echo reply seq 1
What command was used on the host 192.168.123.5, to generate this output?

Erklärung

Frage 24 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Which command can be used to change the password for an LDAP entry?

Erklärung

Frage 25 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

In which directory are the PAM modules stored?

Erklärung

Frage 26 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

What file should be edited to make the route command show human-readable names for networks? (Please enter the full path)

Erklärung

Frage 27 von 60

1

Which keys are stored in the authorized_keys file?

Wähle eine oder mehr der folgenden:

  • public

  • private

Erklärung

Frage 28 von 60

1

To allow X connections to be forwarded from or through an SSH server, what line must exist in the sshd configuration file?

X11Forwarding yes

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 29 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

A malicious user has sent a 35MB video clip, as an attachment, to hundreds of Recipients. Looking in the outbound queue reveals that this is the only mail there.This mail can be removed with the command rm * . Complete the path below.

Erklärung

Frage 30 von 60

1

Which file, in the local file-system, is presented when the client requests http://server/~joe/index.html and the following directive is present in server’s Apache configuration file? UserDir site/html
Given that all users have their home directory in /home, please type in the FULL file name including the path.

Answer: /home/joe/site/html/index.html

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 31 von 60

1

Which port must be open on a firewall, to allow a DNS server to receive queries? (Enter only the port number).

Wähle eine oder mehr der folgenden:

  • 56

  • 63

  • 8080

  • 53

Erklärung

Frage 32 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

The users of the local network complain that name resolution is not fast enough. Enter the command, without the path or any options, that shows the time taken to resolve a DNS query

Erklärung

Frage 33 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

37 In which configuration file can a key-file be defined to enable secure DNS zone transfers? (Please enter the file name without the path)

Erklärung

Frage 34 von 60

1

Which type of DNS record defines which server(s) email for a domain should be sent to?
Answer: MX

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 35 von 60

1

Fülle die Lücke, um den Text zu vervollständigen

Using only commands included with named, what is the command, with options or parameters, to make named re-read its zone files?

Erklärung

Frage 36 von 60

1

Which daemon is required on the client if an ethernet device gets its IP address from a central server?__

Wähle eine der folgenden:

  • dhcp

  • dhcpcd

  • bootpd

  • ethd

  • dhcpd

Erklärung

Frage 37 von 60

1

A network has many network printers connected and they should get their addresses using DHCP. What information from each printer is needed to always assign them the same IP address when dhcpd is used as the DHCP server?

Wähle eine der folgenden:

  • MAC address

  • Host name

  • Serial number

  • Factory default IP address

  • Built-in network card type

Erklärung

Frage 38 von 60

1

Select the alternative that shows the correct way to disable a user login (except for root)

Wähle eine der folgenden:

  • The use of the pam_nologin module along with the /etc/login configuration file

  • The use of the pam_deny module along with the /etc/deny configuration file

  • The use of the pam_pwdb module along with the /etc/pwdb.conf configuration file

  • The use of the pam_console module along with the /etc/security/console.perms configuration file

  • The use of the pam_nologin module along with the /etc/nologin configuration file

Erklärung

Frage 39 von 60

1

Which command would release the current IP address leased by a DHCP server?

Wähle eine der folgenden:

  • ipconfig /release

  • ifconfig –release-all

  • dhclient -r

  • ifconfig –release

  • pump –release

Erklärung

Frage 40 von 60

1

Which records must be entered in a zone file in order to use "Round Robin Load Distribution" for a web server?

Wähle eine der folgenden:

  • www.example.org. 60 IN A 192.168.1.1
    www.example.org. 60 IN A 192.168.1.2
    www.example.org. 60 IN A 192.168.1.3

  • www.example.org. 60 IN A 192.168.1.1;192.168.1.2;192.168.1.3

  • www.example.org. 60 IN A 192.168.1-3

  • www.example.org. 60 IN RR 192.168.1:3

  • www.example.org. 60 IN RR 192.168.1.1;192.168.1.2;192.168.1.3

Erklärung

Frage 41 von 60

1

Which of these tools can provide the most information about DNS queries?

Wähle eine der folgenden:

  • dig

  • nslookup

  • host

  • named-checkconf

  • named-checkzone

Erklärung

Frage 42 von 60

1

Which command line create an SSH tunnel for POP and SMTP protocols?

Wähle eine der folgenden:

  • ssh- L :110 -L :25 -1 user -N mailhost

  • ssh -L 25:110 -1 user -N mailhost

  • ssh -L mailhost:110 -L mailhost:25 -1 user -N mailhost

  • ssh -L mailhost:25:110 -1 user

  • ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

Erklärung

Frage 43 von 60

1

An iptables firewall was configured to use the target MASQUERADE to share a dedicated wireless connection to the Internet with a few hosts on the local network.
The Internet connection becomes very unstable in rainy days and users complain their connections drop when downloading e-mail or large files, while web browsing seems to be working fine.
Which change to your iptables rules could alleviate the problem?

Wähle eine der folgenden:

  • Change the target MASQUERADE to SNAT

  • Change the target MASQUERADE to DNAT

  • Change the target MASQUERADE to BALANCE and provide a backup Internet connection

  • Change the target MASQUERADE to REDIRECT and provide a backup Internet connection

  • Change the target MASQUERADE to BNAT

Erklärung

Frage 44 von 60

1

Connecting to a remote host on the same LAN using ssh public-key authentication works but forwarding X11 doesn’t. The remote host allows access to both services. Which of the following can be the reason for that behaviour?

Wähle eine der folgenden:

  • The remote user’s ssh_config file disallows X11 forwarding

  • A different public key has to be used for X11

  • The remote server’s sshd_config file disallows X11 forwarding

  • X11 cannot be forwarded if public-key authentication was used

  • X11 though SSH needs a special X11 server application installed

Erklärung

Frage 45 von 60

1

Which THREE of the following actions should be considered when a FTP chroot jail is created?

Wähle eine oder mehr der folgenden:

  • Create /dev/ and /etc/ in the chroot enviroment

  • Create /etc/passwd in the chroot enviroment

  • Create /var/cache/ftp in the chroot enviroment

  • Create the user ftp in the chroot enviroment

  • Create /usr/sbin/ in the chroot enviroment

Erklärung

Frage 46 von 60

1

To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host’s IP address is 192.168.43.12, which of the following commands is correct?

Wähle eine der folgenden:

  • iptables – A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 80 -j ACCEPT

  • iptables – A FORWARD -p tcp -s 192.168.43.12 d 10.12.34.56:443 -j ACCEPT.

  • iptables – A FORWARD -p tcp -s 192.168.43.12 -d 10.12.34.56 –dport 443 -j ACCEPT.

  • iptables – A INPUT -p tcp -s 192.168.43.12 – d 10.12.34.56:80 -j ACCEPT.

  • iptables – A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 443 -j ACCEPT.

Erklärung

Frage 47 von 60

1

When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

Wähle eine der folgenden:

  • All traffic to localhost must always be allowed.

  • It doesn’t matter; iptables never affects packets addressed to localhost

  • Sendmail delivers emails to localhost

  • Some applications use the localhost interface to communicate with other applications.

  • syslogd receives messages on localhost

Erklärung

Frage 48 von 60

1

A server is being used as a smurf amplifier, whereby it is responding to ICMP Echo-Request packets sent to its broadcast address. To disable this, which command needs to be run?

Wähle eine der folgenden:

  • ifconfig eth0 nobroadcast

  • echo "0" > /proc/sys/net/ipv4/icmp_echo_accept_broadcasts

  • iptables -A INPUT -p icmp -j REJECT

  • echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts

  • echo "1" > /proc/sys/net/ipv4/icmp_echo_nosmurf

Erklärung

Frage 49 von 60

1

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

Wähle eine der folgenden:

  • AllowForwarding

  • ForwardingAllow

  • XllForwardingAllow

  • XllForwarding

Erklärung

Frage 50 von 60

1

Which of the following options are valid in /etc/exports? (Choose two.)

Wähle eine oder mehr der folgenden:

  • rw

  • ro

  • rootsquash

  • norootsquash

  • uid

Erklärung

Frage 51 von 60

1

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

Wähle eine oder mehr der folgenden:

  • -sO

  • -sZ

  • -sT

  • -sU

  • -sS

Erklärung

Frage 52 von 60

1

Which of the following commands can be used to connect and interact with remote TCP network services?
(Choose two.)

Wähle eine oder mehr der folgenden:

  • nettalk

  • nc

  • telnet

  • cat

  • netmap

Erklärung

Frage 53 von 60

1

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

Wähle eine der folgenden:

  • allow-zone-transfer

  • allow-transfer

  • allow-secondary

  • allow-slaves

  • allow-queries

Erklärung

Frage 54 von 60

1

What option for BIND is required in the global options to disable recursive queries on the DNS server by default?

Wähle eine der folgenden:

  • allow-recursive-query ( none; );

  • allow-recursive-query off;

  • recursion { disabled; };

  • recursion { none; };

  • recursion no;

Erklärung

Frage 55 von 60

1

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

Wähle eine der folgenden:

  • location

  • htdocs

  • DocumentRoot

  • root

  • base_dir

Erklärung

Frage 56 von 60

1

What directive can be used in named.conf to restrict zone transfers to the 192.168.1.0/24 network?

Wähle eine der folgenden:

  • allow-transfer { 192.168.1.0/24; };

  • allow-transfer { 192.168.1.0/24 };

  • allow-axfr { 192.168.1.0/24; };

  • allow-axfr { 192.168.1.0/24 };

Erklärung

Frage 57 von 60

1

To securely use dynamic DNS updates, the use of TSIG is recommended. Which TWO

Wähle eine oder mehr der folgenden:

  • TSIG is used for zone data encryption

  • TSIG is a signal to start a zone update

  • TSIG is used in zone files

  • TSIG is used only in server configuration

  • Servers using TSIG must be in sync (time zone!)

Erklärung

Frage 58 von 60

1

Which option is used to configure pppd to use up to two DNS server addresses provided by the remote server?

Wähle eine der folgenden:

  • ms-dns

  • nameserver

  • usepeerdns

  • dns

  • None of the above

Erklärung

Frage 59 von 60

1

A DNS server has the IP address 192.168.0.1. Which TWO of the following need to be done on a client machine to use this DNS server?

Wähle eine oder mehr der folgenden:

  • Add nameserver 192.168.0.1 to /etc/resolv.conf

  • Run route add nameserver 192.168.0.1

  • Run ifconfig eth0 nameserver 192.168.0.1

  • Run echo “nameserver 192.168.1.1” >> /etc/resolv.conf

  • Run bind nameserver 192.168.1.1

Erklärung

Frage 60 von 60

1

There is a restricted area in an Apache site, which requires users to authenticate against the file /srv/ www/security/site-passwd. Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used.

Wähle eine der folgenden:

  • htpasswd -c /srv/www/security/site passwd user

  • htpasswd /srv/www/security/site-passwd user

  • htpasswd -n /srv/www/security/site-passwd user

  • htpasswd -D /srv/www/security/site-passwd user

  • None of the above

Erklärung