Luiz  Eduardo
Quiz by , created more than 1 year ago

LPI QUESTIONS

52
0
0
Luiz  Eduardo
Created by Luiz Eduardo about 5 years ago
Close

UNIX QUESTIONS 1

Question 1 of 60

1

When connecting to an SSH server for the first time, its fingerprint is received and stored in a file, which is located at:

Select one of the following:

  • ~/ .ssh/fingerprints

  • ~/ .ssh/id_dsa

  • ~/ .ssh/known_hosts

  • ~/ .ssh/id_dsa.pub

  • ~/ .ssh/gpg.txt

Explanation

Question 2 of 60

1

Fill the blank space to complete the text.

Where is the user foo’s procmail configuration stored, if home directories are stored in /home? Please enter the complete path to the file

Explanation

Question 3 of 60

1

Fill the blank space to complete the text.

Postfix daemons can be chroot’d by setting the chroot flag in . (Supply only the filename, without a path)

Explanation

Question 4 of 60

1

Fill the blank space to complete the text.

What is the default location for sendmail configuration files? (Please provide the complete path to the directory

Explanation

Question 5 of 60

1

Fill the blank space to complete the text.

What command is used to print NFS kernel statistics? (Provide the command with or without complete path)

Explanation

Question 6 of 60

1

Fill the blank space to complete the text.

What is the name of the module in Apache that provides the HTTP Basic Authentication functionality? (Please provide ONLY the module name)

Explanation

Question 7 of 60

1

Fill the blank space to complete the text.

In which directory can all parameters available to sysctl be found? (Provide the full path)

Explanation

Question 8 of 60

1

Fill the blank space to complete the text.

This program has 3 operating modes: copy-in mode, copy-out mode, and copy-pass mode, and is used to copy files into or out of archives. What program is this?
(Please provide the command name only, with no arguments or path.)

Explanation

Question 9 of 60

1

Fill the blank space to complete the text.

The command -x foo will delete the user foo from the Samba database. (Specify the command only, no path information.)

Explanation

Question 10 of 60

1

Fill the blank space to complete the text.

What postfix configuration setting defines the domains for which Postfix will deliver mail locally? (Please provide only the configuration setting name with no other information

Explanation

Question 11 of 60

1

Fill the blank space to complete the text.

What is the path to the global postfix configuration file? (Please specify the complete directory path and file name

Explanation

Question 12 of 60

1

Fill the blank space to complete the text.

Which Samba-related command will show all options that were not modified using smb.conf and thus are set to their default values? Please enter the command and its parameter(s):

Explanation

Question 13 of 60

1

Fill the blank space to complete the text.

Which site-specific configuration file for the shadow login suite must be modified to log login failures? Please enter the complete path to that file._

Explanation

Question 14 of 60

1

Fill the blank space to complete the text.

You are not sure whether the kernel has detected a piece of hardware in your machine. What command, without options or parameters, should be run to present the contents of the kernel ring-buffer?

Explanation

Question 15 of 60

1

Fill the blank space to complete the text.

You have installed some new libraries, but these are not available to programs and are not listed by lconfig -p. What file should the path to the libraries be added to, before running ldconfig?

Explanation

Question 16 of 60

1

Fill the blank space to complete the text.

nfsd, portmap and daemons must be running on an NFS server.

Explanation

Question 17 of 60

1

Fill the blank space to complete the text.

With which parameter in the smb.conf file can a share be hidden?

Explanation

Question 18 of 60

1

Please enter the complete command to create a new password file for HTTP basic authentication (/home/http/data/web _passwd) for user john.
htpasswd -c /home/http/data/web_passwd john

Select one of the following:

  • True
  • False

Explanation

Question 19 of 60

1

Fill the blank space to complete the text.

Please enter the command used to remove Kerberos tickets from the cache below.

Explanation

Question 20 of 60

1

Fill the blank space to complete the text.

All machines outside the network are able to send emails through the server to addresses not served by that server. If the server accepts and delivers the email, then it is a(n) . Please enter the English term, without any punctuation.

Explanation

Question 21 of 60

1

Fill the blank space to complete the text.

Which command can be used to save the current iptables rules into a file? Please enter only the command without path or parameters.

Explanation

Question 22 of 60

1

Fill the blank space to complete the text.

Which file on a Postfix server modifies the sender address for outgoing e-mails? Please enter only the file name without the path.

Explanation

Question 23 of 60

1

Fill the blank space to complete the text.

Running tcpdump -nli eth1 ‘icmp’ shows the following output:
11:56:35.599063 IP 192.168.123.5 > 194.25.2.129: icmp 64: echo request seq 1
11:56:35.670910 IP 194.25.2.129 > 192.168.123.5: icmp 64: echo reply seq 1
What command was used on the host 192.168.123.5, to generate this output?

Explanation

Question 24 of 60

1

Fill the blank space to complete the text.

Which command can be used to change the password for an LDAP entry?

Explanation

Question 25 of 60

1

Fill the blank space to complete the text.

In which directory are the PAM modules stored?

Explanation

Question 26 of 60

1

Fill the blank space to complete the text.

What file should be edited to make the route command show human-readable names for networks? (Please enter the full path)

Explanation

Question 27 of 60

1

Which keys are stored in the authorized_keys file?

Select one or more of the following:

  • public

  • private

Explanation

Question 28 of 60

1

To allow X connections to be forwarded from or through an SSH server, what line must exist in the sshd configuration file?

X11Forwarding yes

Select one of the following:

  • True
  • False

Explanation

Question 29 of 60

1

Fill the blank space to complete the text.

A malicious user has sent a 35MB video clip, as an attachment, to hundreds of Recipients. Looking in the outbound queue reveals that this is the only mail there.This mail can be removed with the command rm * . Complete the path below.

Explanation

Question 30 of 60

1

Which file, in the local file-system, is presented when the client requests http://server/~joe/index.html and the following directive is present in server’s Apache configuration file? UserDir site/html
Given that all users have their home directory in /home, please type in the FULL file name including the path.

Answer: /home/joe/site/html/index.html

Select one of the following:

  • True
  • False

Explanation

Question 31 of 60

1

Which port must be open on a firewall, to allow a DNS server to receive queries? (Enter only the port number).

Select one or more of the following:

  • 56

  • 63

  • 8080

  • 53

Explanation

Question 32 of 60

1

Fill the blank space to complete the text.

The users of the local network complain that name resolution is not fast enough. Enter the command, without the path or any options, that shows the time taken to resolve a DNS query

Explanation

Question 33 of 60

1

Fill the blank space to complete the text.

37 In which configuration file can a key-file be defined to enable secure DNS zone transfers? (Please enter the file name without the path)

Explanation

Question 34 of 60

1

Which type of DNS record defines which server(s) email for a domain should be sent to?
Answer: MX

Select one of the following:

  • True
  • False

Explanation

Question 35 of 60

1

Fill the blank space to complete the text.

Using only commands included with named, what is the command, with options or parameters, to make named re-read its zone files?

Explanation

Question 36 of 60

1

Which daemon is required on the client if an ethernet device gets its IP address from a central server?__

Select one of the following:

  • dhcp

  • dhcpcd

  • bootpd

  • ethd

  • dhcpd

Explanation

Question 37 of 60

1

A network has many network printers connected and they should get their addresses using DHCP. What information from each printer is needed to always assign them the same IP address when dhcpd is used as the DHCP server?

Select one of the following:

  • MAC address

  • Host name

  • Serial number

  • Factory default IP address

  • Built-in network card type

Explanation

Question 38 of 60

1

Select the alternative that shows the correct way to disable a user login (except for root)

Select one of the following:

  • The use of the pam_nologin module along with the /etc/login configuration file

  • The use of the pam_deny module along with the /etc/deny configuration file

  • The use of the pam_pwdb module along with the /etc/pwdb.conf configuration file

  • The use of the pam_console module along with the /etc/security/console.perms configuration file

  • The use of the pam_nologin module along with the /etc/nologin configuration file

Explanation

Question 39 of 60

1

Which command would release the current IP address leased by a DHCP server?

Select one of the following:

  • ipconfig /release

  • ifconfig –release-all

  • dhclient -r

  • ifconfig –release

  • pump –release

Explanation

Question 40 of 60

1

Which records must be entered in a zone file in order to use "Round Robin Load Distribution" for a web server?

Select one of the following:

  • www.example.org. 60 IN A 192.168.1.1
    www.example.org. 60 IN A 192.168.1.2
    www.example.org. 60 IN A 192.168.1.3

  • www.example.org. 60 IN A 192.168.1.1;192.168.1.2;192.168.1.3

  • www.example.org. 60 IN A 192.168.1-3

  • www.example.org. 60 IN RR 192.168.1:3

  • www.example.org. 60 IN RR 192.168.1.1;192.168.1.2;192.168.1.3

Explanation

Question 41 of 60

1

Which of these tools can provide the most information about DNS queries?

Select one of the following:

  • dig

  • nslookup

  • host

  • named-checkconf

  • named-checkzone

Explanation

Question 42 of 60

1

Which command line create an SSH tunnel for POP and SMTP protocols?

Select one of the following:

  • ssh- L :110 -L :25 -1 user -N mailhost

  • ssh -L 25:110 -1 user -N mailhost

  • ssh -L mailhost:110 -L mailhost:25 -1 user -N mailhost

  • ssh -L mailhost:25:110 -1 user

  • ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

Explanation

Question 43 of 60

1

An iptables firewall was configured to use the target MASQUERADE to share a dedicated wireless connection to the Internet with a few hosts on the local network.
The Internet connection becomes very unstable in rainy days and users complain their connections drop when downloading e-mail or large files, while web browsing seems to be working fine.
Which change to your iptables rules could alleviate the problem?

Select one of the following:

  • Change the target MASQUERADE to SNAT

  • Change the target MASQUERADE to DNAT

  • Change the target MASQUERADE to BALANCE and provide a backup Internet connection

  • Change the target MASQUERADE to REDIRECT and provide a backup Internet connection

  • Change the target MASQUERADE to BNAT

Explanation

Question 44 of 60

1

Connecting to a remote host on the same LAN using ssh public-key authentication works but forwarding X11 doesn’t. The remote host allows access to both services. Which of the following can be the reason for that behaviour?

Select one of the following:

  • The remote user’s ssh_config file disallows X11 forwarding

  • A different public key has to be used for X11

  • The remote server’s sshd_config file disallows X11 forwarding

  • X11 cannot be forwarded if public-key authentication was used

  • X11 though SSH needs a special X11 server application installed

Explanation

Question 45 of 60

1

Which THREE of the following actions should be considered when a FTP chroot jail is created?

Select one or more of the following:

  • Create /dev/ and /etc/ in the chroot enviroment

  • Create /etc/passwd in the chroot enviroment

  • Create /var/cache/ftp in the chroot enviroment

  • Create the user ftp in the chroot enviroment

  • Create /usr/sbin/ in the chroot enviroment

Explanation

Question 46 of 60

1

To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host’s IP address is 192.168.43.12, which of the following commands is correct?

Select one of the following:

  • iptables – A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 80 -j ACCEPT

  • iptables – A FORWARD -p tcp -s 192.168.43.12 d 10.12.34.56:443 -j ACCEPT.

  • iptables – A FORWARD -p tcp -s 192.168.43.12 -d 10.12.34.56 –dport 443 -j ACCEPT.

  • iptables – A INPUT -p tcp -s 192.168.43.12 – d 10.12.34.56:80 -j ACCEPT.

  • iptables – A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 443 -j ACCEPT.

Explanation

Question 47 of 60

1

When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

Select one of the following:

  • All traffic to localhost must always be allowed.

  • It doesn’t matter; iptables never affects packets addressed to localhost

  • Sendmail delivers emails to localhost

  • Some applications use the localhost interface to communicate with other applications.

  • syslogd receives messages on localhost

Explanation

Question 48 of 60

1

A server is being used as a smurf amplifier, whereby it is responding to ICMP Echo-Request packets sent to its broadcast address. To disable this, which command needs to be run?

Select one of the following:

  • ifconfig eth0 nobroadcast

  • echo "0" > /proc/sys/net/ipv4/icmp_echo_accept_broadcasts

  • iptables -A INPUT -p icmp -j REJECT

  • echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts

  • echo "1" > /proc/sys/net/ipv4/icmp_echo_nosmurf

Explanation

Question 49 of 60

1

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

Select one of the following:

  • AllowForwarding

  • ForwardingAllow

  • XllForwardingAllow

  • XllForwarding

Explanation

Question 50 of 60

1

Which of the following options are valid in /etc/exports? (Choose two.)

Select one or more of the following:

  • rw

  • ro

  • rootsquash

  • norootsquash

  • uid

Explanation

Question 51 of 60

1

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

Select one or more of the following:

  • -sO

  • -sZ

  • -sT

  • -sU

  • -sS

Explanation

Question 52 of 60

1

Which of the following commands can be used to connect and interact with remote TCP network services?
(Choose two.)

Select one or more of the following:

  • nettalk

  • nc

  • telnet

  • cat

  • netmap

Explanation

Question 53 of 60

1

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

Select one of the following:

  • allow-zone-transfer

  • allow-transfer

  • allow-secondary

  • allow-slaves

  • allow-queries

Explanation

Question 54 of 60

1

What option for BIND is required in the global options to disable recursive queries on the DNS server by default?

Select one of the following:

  • allow-recursive-query ( none; );

  • allow-recursive-query off;

  • recursion { disabled; };

  • recursion { none; };

  • recursion no;

Explanation

Question 55 of 60

1

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

Select one of the following:

  • location

  • htdocs

  • DocumentRoot

  • root

  • base_dir

Explanation

Question 56 of 60

1

What directive can be used in named.conf to restrict zone transfers to the 192.168.1.0/24 network?

Select one of the following:

  • allow-transfer { 192.168.1.0/24; };

  • allow-transfer { 192.168.1.0/24 };

  • allow-axfr { 192.168.1.0/24; };

  • allow-axfr { 192.168.1.0/24 };

Explanation

Question 57 of 60

1

To securely use dynamic DNS updates, the use of TSIG is recommended. Which TWO

Select one or more of the following:

  • TSIG is used for zone data encryption

  • TSIG is a signal to start a zone update

  • TSIG is used in zone files

  • TSIG is used only in server configuration

  • Servers using TSIG must be in sync (time zone!)

Explanation

Question 58 of 60

1

Which option is used to configure pppd to use up to two DNS server addresses provided by the remote server?

Select one of the following:

  • ms-dns

  • nameserver

  • usepeerdns

  • dns

  • None of the above

Explanation

Question 59 of 60

1

A DNS server has the IP address 192.168.0.1. Which TWO of the following need to be done on a client machine to use this DNS server?

Select one or more of the following:

  • Add nameserver 192.168.0.1 to /etc/resolv.conf

  • Run route add nameserver 192.168.0.1

  • Run ifconfig eth0 nameserver 192.168.0.1

  • Run echo “nameserver 192.168.1.1” >> /etc/resolv.conf

  • Run bind nameserver 192.168.1.1

Explanation

Question 60 of 60

1

There is a restricted area in an Apache site, which requires users to authenticate against the file /srv/ www/security/site-passwd. Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used.

Select one of the following:

  • htpasswd -c /srv/www/security/site passwd user

  • htpasswd /srv/www/security/site-passwd user

  • htpasswd -n /srv/www/security/site-passwd user

  • htpasswd -D /srv/www/security/site-passwd user

  • None of the above

Explanation