Luiz  Eduardo
Quiz por , criado more than 1 year ago

LPI QUESTIONS

57
0
0
Luiz  Eduardo
Criado por Luiz Eduardo mais de 5 anos atrás
Fechar

UNIX QUESTIONS 1

Questão 1 de 60

1

When connecting to an SSH server for the first time, its fingerprint is received and stored in a file, which is located at:

Selecione uma das seguintes:

  • ~/ .ssh/fingerprints

  • ~/ .ssh/id_dsa

  • ~/ .ssh/known_hosts

  • ~/ .ssh/id_dsa.pub

  • ~/ .ssh/gpg.txt

Explicação

Questão 2 de 60

1

Preencha o espaço em branco para completar o texto.

Where is the user foo’s procmail configuration stored, if home directories are stored in /home? Please enter the complete path to the file

Explicação

Questão 3 de 60

1

Preencha o espaço em branco para completar o texto.

Postfix daemons can be chroot’d by setting the chroot flag in . (Supply only the filename, without a path)

Explicação

Questão 4 de 60

1

Preencha o espaço em branco para completar o texto.

What is the default location for sendmail configuration files? (Please provide the complete path to the directory

Explicação

Questão 5 de 60

1

Preencha o espaço em branco para completar o texto.

What command is used to print NFS kernel statistics? (Provide the command with or without complete path)

Explicação

Questão 6 de 60

1

Preencha o espaço em branco para completar o texto.

What is the name of the module in Apache that provides the HTTP Basic Authentication functionality? (Please provide ONLY the module name)

Explicação

Questão 7 de 60

1

Preencha o espaço em branco para completar o texto.

In which directory can all parameters available to sysctl be found? (Provide the full path)

Explicação

Questão 8 de 60

1

Preencha o espaço em branco para completar o texto.

This program has 3 operating modes: copy-in mode, copy-out mode, and copy-pass mode, and is used to copy files into or out of archives. What program is this?
(Please provide the command name only, with no arguments or path.)

Explicação

Questão 9 de 60

1

Preencha o espaço em branco para completar o texto.

The command -x foo will delete the user foo from the Samba database. (Specify the command only, no path information.)

Explicação

Questão 10 de 60

1

Preencha o espaço em branco para completar o texto.

What postfix configuration setting defines the domains for which Postfix will deliver mail locally? (Please provide only the configuration setting name with no other information

Explicação

Questão 11 de 60

1

Preencha o espaço em branco para completar o texto.

What is the path to the global postfix configuration file? (Please specify the complete directory path and file name

Explicação

Questão 12 de 60

1

Preencha o espaço em branco para completar o texto.

Which Samba-related command will show all options that were not modified using smb.conf and thus are set to their default values? Please enter the command and its parameter(s):

Explicação

Questão 13 de 60

1

Preencha o espaço em branco para completar o texto.

Which site-specific configuration file for the shadow login suite must be modified to log login failures? Please enter the complete path to that file._

Explicação

Questão 14 de 60

1

Preencha o espaço em branco para completar o texto.

You are not sure whether the kernel has detected a piece of hardware in your machine. What command, without options or parameters, should be run to present the contents of the kernel ring-buffer?

Explicação

Questão 15 de 60

1

Preencha o espaço em branco para completar o texto.

You have installed some new libraries, but these are not available to programs and are not listed by lconfig -p. What file should the path to the libraries be added to, before running ldconfig?

Explicação

Questão 16 de 60

1

Preencha o espaço em branco para completar o texto.

nfsd, portmap and daemons must be running on an NFS server.

Explicação

Questão 17 de 60

1

Preencha o espaço em branco para completar o texto.

With which parameter in the smb.conf file can a share be hidden?

Explicação

Questão 18 de 60

1

Please enter the complete command to create a new password file for HTTP basic authentication (/home/http/data/web _passwd) for user john.
htpasswd -c /home/http/data/web_passwd john

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 19 de 60

1

Preencha o espaço em branco para completar o texto.

Please enter the command used to remove Kerberos tickets from the cache below.

Explicação

Questão 20 de 60

1

Preencha o espaço em branco para completar o texto.

All machines outside the network are able to send emails through the server to addresses not served by that server. If the server accepts and delivers the email, then it is a(n) . Please enter the English term, without any punctuation.

Explicação

Questão 21 de 60

1

Preencha o espaço em branco para completar o texto.

Which command can be used to save the current iptables rules into a file? Please enter only the command without path or parameters.

Explicação

Questão 22 de 60

1

Preencha o espaço em branco para completar o texto.

Which file on a Postfix server modifies the sender address for outgoing e-mails? Please enter only the file name without the path.

Explicação

Questão 23 de 60

1

Preencha o espaço em branco para completar o texto.

Running tcpdump -nli eth1 ‘icmp’ shows the following output:
11:56:35.599063 IP 192.168.123.5 > 194.25.2.129: icmp 64: echo request seq 1
11:56:35.670910 IP 194.25.2.129 > 192.168.123.5: icmp 64: echo reply seq 1
What command was used on the host 192.168.123.5, to generate this output?

Explicação

Questão 24 de 60

1

Preencha o espaço em branco para completar o texto.

Which command can be used to change the password for an LDAP entry?

Explicação

Questão 25 de 60

1

Preencha o espaço em branco para completar o texto.

In which directory are the PAM modules stored?

Explicação

Questão 26 de 60

1

Preencha o espaço em branco para completar o texto.

What file should be edited to make the route command show human-readable names for networks? (Please enter the full path)

Explicação

Questão 27 de 60

1

Which keys are stored in the authorized_keys file?

Selecione uma ou mais das seguintes:

  • public

  • private

Explicação

Questão 28 de 60

1

To allow X connections to be forwarded from or through an SSH server, what line must exist in the sshd configuration file?

X11Forwarding yes

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 29 de 60

1

Preencha o espaço em branco para completar o texto.

A malicious user has sent a 35MB video clip, as an attachment, to hundreds of Recipients. Looking in the outbound queue reveals that this is the only mail there.This mail can be removed with the command rm * . Complete the path below.

Explicação

Questão 30 de 60

1

Which file, in the local file-system, is presented when the client requests http://server/~joe/index.html and the following directive is present in server’s Apache configuration file? UserDir site/html
Given that all users have their home directory in /home, please type in the FULL file name including the path.

Answer: /home/joe/site/html/index.html

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 31 de 60

1

Which port must be open on a firewall, to allow a DNS server to receive queries? (Enter only the port number).

Selecione uma ou mais das seguintes:

  • 56

  • 63

  • 8080

  • 53

Explicação

Questão 32 de 60

1

Preencha o espaço em branco para completar o texto.

The users of the local network complain that name resolution is not fast enough. Enter the command, without the path or any options, that shows the time taken to resolve a DNS query

Explicação

Questão 33 de 60

1

Preencha o espaço em branco para completar o texto.

37 In which configuration file can a key-file be defined to enable secure DNS zone transfers? (Please enter the file name without the path)

Explicação

Questão 34 de 60

1

Which type of DNS record defines which server(s) email for a domain should be sent to?
Answer: MX

Selecione uma das opções:

  • VERDADEIRO
  • FALSO

Explicação

Questão 35 de 60

1

Preencha o espaço em branco para completar o texto.

Using only commands included with named, what is the command, with options or parameters, to make named re-read its zone files?

Explicação

Questão 36 de 60

1

Which daemon is required on the client if an ethernet device gets its IP address from a central server?__

Selecione uma das seguintes:

  • dhcp

  • dhcpcd

  • bootpd

  • ethd

  • dhcpd

Explicação

Questão 37 de 60

1

A network has many network printers connected and they should get their addresses using DHCP. What information from each printer is needed to always assign them the same IP address when dhcpd is used as the DHCP server?

Selecione uma das seguintes:

  • MAC address

  • Host name

  • Serial number

  • Factory default IP address

  • Built-in network card type

Explicação

Questão 38 de 60

1

Select the alternative that shows the correct way to disable a user login (except for root)

Selecione uma das seguintes:

  • The use of the pam_nologin module along with the /etc/login configuration file

  • The use of the pam_deny module along with the /etc/deny configuration file

  • The use of the pam_pwdb module along with the /etc/pwdb.conf configuration file

  • The use of the pam_console module along with the /etc/security/console.perms configuration file

  • The use of the pam_nologin module along with the /etc/nologin configuration file

Explicação

Questão 39 de 60

1

Which command would release the current IP address leased by a DHCP server?

Selecione uma das seguintes:

  • ipconfig /release

  • ifconfig –release-all

  • dhclient -r

  • ifconfig –release

  • pump –release

Explicação

Questão 40 de 60

1

Which records must be entered in a zone file in order to use "Round Robin Load Distribution" for a web server?

Selecione uma das seguintes:

  • www.example.org. 60 IN A 192.168.1.1
    www.example.org. 60 IN A 192.168.1.2
    www.example.org. 60 IN A 192.168.1.3

  • www.example.org. 60 IN A 192.168.1.1;192.168.1.2;192.168.1.3

  • www.example.org. 60 IN A 192.168.1-3

  • www.example.org. 60 IN RR 192.168.1:3

  • www.example.org. 60 IN RR 192.168.1.1;192.168.1.2;192.168.1.3

Explicação

Questão 41 de 60

1

Which of these tools can provide the most information about DNS queries?

Selecione uma das seguintes:

  • dig

  • nslookup

  • host

  • named-checkconf

  • named-checkzone

Explicação

Questão 42 de 60

1

Which command line create an SSH tunnel for POP and SMTP protocols?

Selecione uma das seguintes:

  • ssh- L :110 -L :25 -1 user -N mailhost

  • ssh -L 25:110 -1 user -N mailhost

  • ssh -L mailhost:110 -L mailhost:25 -1 user -N mailhost

  • ssh -L mailhost:25:110 -1 user

  • ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

Explicação

Questão 43 de 60

1

An iptables firewall was configured to use the target MASQUERADE to share a dedicated wireless connection to the Internet with a few hosts on the local network.
The Internet connection becomes very unstable in rainy days and users complain their connections drop when downloading e-mail or large files, while web browsing seems to be working fine.
Which change to your iptables rules could alleviate the problem?

Selecione uma das seguintes:

  • Change the target MASQUERADE to SNAT

  • Change the target MASQUERADE to DNAT

  • Change the target MASQUERADE to BALANCE and provide a backup Internet connection

  • Change the target MASQUERADE to REDIRECT and provide a backup Internet connection

  • Change the target MASQUERADE to BNAT

Explicação

Questão 44 de 60

1

Connecting to a remote host on the same LAN using ssh public-key authentication works but forwarding X11 doesn’t. The remote host allows access to both services. Which of the following can be the reason for that behaviour?

Selecione uma das seguintes:

  • The remote user’s ssh_config file disallows X11 forwarding

  • A different public key has to be used for X11

  • The remote server’s sshd_config file disallows X11 forwarding

  • X11 cannot be forwarded if public-key authentication was used

  • X11 though SSH needs a special X11 server application installed

Explicação

Questão 45 de 60

1

Which THREE of the following actions should be considered when a FTP chroot jail is created?

Selecione uma ou mais das seguintes:

  • Create /dev/ and /etc/ in the chroot enviroment

  • Create /etc/passwd in the chroot enviroment

  • Create /var/cache/ftp in the chroot enviroment

  • Create the user ftp in the chroot enviroment

  • Create /usr/sbin/ in the chroot enviroment

Explicação

Questão 46 de 60

1

To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host’s IP address is 192.168.43.12, which of the following commands is correct?

Selecione uma das seguintes:

  • iptables – A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 80 -j ACCEPT

  • iptables – A FORWARD -p tcp -s 192.168.43.12 d 10.12.34.56:443 -j ACCEPT.

  • iptables – A FORWARD -p tcp -s 192.168.43.12 -d 10.12.34.56 –dport 443 -j ACCEPT.

  • iptables – A INPUT -p tcp -s 192.168.43.12 – d 10.12.34.56:80 -j ACCEPT.

  • iptables – A FORWARD -p tcp -s 0/0 -d 10.12.34.56 –dport 443 -j ACCEPT.

Explicação

Questão 47 de 60

1

When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

Selecione uma das seguintes:

  • All traffic to localhost must always be allowed.

  • It doesn’t matter; iptables never affects packets addressed to localhost

  • Sendmail delivers emails to localhost

  • Some applications use the localhost interface to communicate with other applications.

  • syslogd receives messages on localhost

Explicação

Questão 48 de 60

1

A server is being used as a smurf amplifier, whereby it is responding to ICMP Echo-Request packets sent to its broadcast address. To disable this, which command needs to be run?

Selecione uma das seguintes:

  • ifconfig eth0 nobroadcast

  • echo "0" > /proc/sys/net/ipv4/icmp_echo_accept_broadcasts

  • iptables -A INPUT -p icmp -j REJECT

  • echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts

  • echo "1" > /proc/sys/net/ipv4/icmp_echo_nosmurf

Explicação

Questão 49 de 60

1

To allow X connections to be forwarded from or through an SSH server, what configuration keyword must be set to yes in the sshd configuration file?

Selecione uma das seguintes:

  • AllowForwarding

  • ForwardingAllow

  • XllForwardingAllow

  • XllForwarding

Explicação

Questão 50 de 60

1

Which of the following options are valid in /etc/exports? (Choose two.)

Selecione uma ou mais das seguintes:

  • rw

  • ro

  • rootsquash

  • norootsquash

  • uid

Explicação

Questão 51 de 60

1

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

Selecione uma ou mais das seguintes:

  • -sO

  • -sZ

  • -sT

  • -sU

  • -sS

Explicação

Questão 52 de 60

1

Which of the following commands can be used to connect and interact with remote TCP network services?
(Choose two.)

Selecione uma ou mais das seguintes:

  • nettalk

  • nc

  • telnet

  • cat

  • netmap

Explicação

Questão 53 de 60

1

Which BIND option should be used to limit the IP addresses from which slave name servers may connect?

Selecione uma das seguintes:

  • allow-zone-transfer

  • allow-transfer

  • allow-secondary

  • allow-slaves

  • allow-queries

Explicação

Questão 54 de 60

1

What option for BIND is required in the global options to disable recursive queries on the DNS server by default?

Selecione uma das seguintes:

  • allow-recursive-query ( none; );

  • allow-recursive-query off;

  • recursion { disabled; };

  • recursion { none; };

  • recursion no;

Explicação

Questão 55 de 60

1

Which option within a Nginx server configuration section defines the file system path from which the content of the server is retrieved?

Selecione uma das seguintes:

  • location

  • htdocs

  • DocumentRoot

  • root

  • base_dir

Explicação

Questão 56 de 60

1

What directive can be used in named.conf to restrict zone transfers to the 192.168.1.0/24 network?

Selecione uma das seguintes:

  • allow-transfer { 192.168.1.0/24; };

  • allow-transfer { 192.168.1.0/24 };

  • allow-axfr { 192.168.1.0/24; };

  • allow-axfr { 192.168.1.0/24 };

Explicação

Questão 57 de 60

1

To securely use dynamic DNS updates, the use of TSIG is recommended. Which TWO

Selecione uma ou mais das seguintes:

  • TSIG is used for zone data encryption

  • TSIG is a signal to start a zone update

  • TSIG is used in zone files

  • TSIG is used only in server configuration

  • Servers using TSIG must be in sync (time zone!)

Explicação

Questão 58 de 60

1

Which option is used to configure pppd to use up to two DNS server addresses provided by the remote server?

Selecione uma das seguintes:

  • ms-dns

  • nameserver

  • usepeerdns

  • dns

  • None of the above

Explicação

Questão 59 de 60

1

A DNS server has the IP address 192.168.0.1. Which TWO of the following need to be done on a client machine to use this DNS server?

Selecione uma ou mais das seguintes:

  • Add nameserver 192.168.0.1 to /etc/resolv.conf

  • Run route add nameserver 192.168.0.1

  • Run ifconfig eth0 nameserver 192.168.0.1

  • Run echo “nameserver 192.168.1.1” >> /etc/resolv.conf

  • Run bind nameserver 192.168.1.1

Explicação

Questão 60 de 60

1

There is a restricted area in an Apache site, which requires users to authenticate against the file /srv/ www/security/site-passwd. Which command is used to CHANGE the password of existing users, without losing data, when Basic authentication is being used.

Selecione uma das seguintes:

  • htpasswd -c /srv/www/security/site passwd user

  • htpasswd /srv/www/security/site-passwd user

  • htpasswd -n /srv/www/security/site-passwd user

  • htpasswd -D /srv/www/security/site-passwd user

  • None of the above

Explicação