1.
Correct Answer
A. INPUT
2.
A
router must have a network interface on more than one network to transfer
information between networks. True or False.
Correct Answer
A. True
Explanation
A router is a networking device that connects multiple networks together. In order to transfer information between these networks, the router must have a network interface on each of the networks it is connecting. This allows the router to receive data from one network and then transmit it to another network. Therefore, the statement is true.
3.
The
daemons associated with network services listen for network traffic associated
with a particular _________.
Correct Answer
B. Port
Explanation
The daemons associated with network services listen for network traffic associated with a particular port. A port is a communication endpoint in an operating system that allows different applications to send and receive data over a network. Each network service is assigned a specific port number, and the daemons associated with those services listen on that port for incoming network traffic. By monitoring the traffic on a specific port, the daemons can determine which network service the data is intended for and process it accordingly.
4.
Correct Answer
D. 23
5.
The document root
directory contains files shared by the Samba daemon. True or False?
Correct Answer
B. False
Explanation
The document root directory does not contain files shared by the Samba daemon. The correct answer is False.
6.
Before
a computer can be used as a router, it must be provided what configuration
information?
Correct Answer
A. Routing table
Explanation
In order for a computer to function as a router, it must be provided with a routing table. A routing table is a data table stored in a router or a computer that lists the routes to particular network destinations. It contains information about the network topology and determines the best path for forwarding network traffic. Without a routing table, the computer would not be able to properly direct network traffic between different networks.
7.
Correct Answer(s)
A. 1020
B. 50
Explanation
The given answer, 1020,50, could be a sequence of numbers. It is possible that these numbers are part of a larger sequence where each number is obtained by a specific rule or pattern. Without more information or context, it is difficult to determine the exact explanation for this sequence.
8.
What
must you do in order to become a DNS server? (Choose all that apply.)
Correct Answer(s)
A. Create zone files.
B. Create resource records for DNS lookups.
D. Run the name daemon (named).
Explanation
To become a DNS server, you must create zone files, which contain information about the domain names and IP addresses associated with that server. You also need to create resource records for DNS lookups, which provide additional information about the domain names, such as mail server addresses or aliases. Finally, you need to run the name daemon (named), which is the software responsible for handling DNS queries and responses. Creating NIS maps is not required to become a DNS server.
9.
Which
of the following Linux Intrusion Detection Systems can be used to detect port
scans? (Choose all that apply.)
Correct Answer(s)
B. PortSentry
D. Snort
Explanation
PortSentry and Snort are both Linux Intrusion Detection Systems that can be used to detect port scans. PortSentry is a host-based IDS that monitors and responds to suspicious activity on specific ports, while Snort is a network-based IDS that analyzes network traffic for signs of intrusion, including port scans. Both tools have the capability to detect and alert on port scans, making them suitable options for this purpose.
10.
Which
file contains configuration information for the Samba daemons on Red Hat Fedora
Core 2?
Correct Answer
D. /etc/samba/smb.conf
Explanation
The correct answer is /etc/samba/smb.conf. This file contains the configuration information for the Samba daemons on Red Hat Fedora Core 2. It is the main configuration file for Samba, where users can define various settings such as network shares, security options, and authentication methods. By editing this file, administrators can customize the behavior and functionality of Samba on the system.
11.
Which
of the following port numbers is associated with DNS?
Correct Answer
C. 53
Explanation
Port number 53 is associated with DNS (Domain Name System). DNS is responsible for translating domain names into IP addresses. When a client wants to access a website, it sends a DNS query to a DNS server on port 53. The DNS server then responds with the corresponding IP address, allowing the client to establish a connection with the desired website.
12.
Correct Answer
D. /etc/sudoers
Explanation
The correct answer is /etc/sudoers. This file is used by the sudo command in Unix-based systems to determine which users are allowed to run specific commands as the root user or other users. It contains a list of user and group permissions, specifying what commands they are allowed to run and with what privileges. The other options (/etc/sudo, /etc/su.cfg, /etc/sudo.cfg) do not exist or are not used for managing sudo permissions.
13.
Which
of the following actions should you first take to secure your Linux computer
against network attacks?
Correct Answer
B. Ensure that only necessary services are running.
Explanation
To secure a Linux computer against network attacks, the first action you should take is to ensure that only necessary services are running. By disabling or removing unnecessary services, you reduce the potential attack surface and minimize the risk of vulnerabilities being exploited. This helps to limit the exposure of your system to potential threats and enhances its overall security posture. Changing permissions on key system files, running checksums for network service files, and configuring entries in the /etc/sudoers file can also contribute to securing the system, but they are not the first step to take in this scenario.
14.
Correct Answer
C. Nmap
Explanation
Nmap is the correct answer because it is a network scanning tool used to discover hosts and services on a computer network. It sends packets to the target host and analyzes the responses to determine which ports are open, what services are running, and gather other information about the target system. Traceroute and tracert are used to trace the route that packets take from the source to the destination, while sudo is a command used in Unix-like operating systems to run programs with the security privileges of another user.
15.
Which
of the following Linux Intrusion Detection Systems can be used to detect
altered files and directories? (Choose all that apply.)
Correct Answer(s)
A. AIDE
C. Tripwire
Explanation
AIDE and tripwire are both Linux Intrusion Detection Systems that can be used to detect altered files and directories. AIDE (Advanced Intrusion Detection Environment) is a file integrity checker that creates a database of files on the system and regularly checks for any changes or modifications. Tripwire is also a file integrity checker that monitors changes in specified files and directories by comparing them to a previously generated baseline. Both systems are effective in detecting any unauthorized modifications to files and directories on a Linux system.
16.
Correct Answer
C. /etc/httpd/conf/httpd.conf
Explanation
The correct answer is /etc/httpd/conf/httpd.conf because this file is the main configuration file for the Apache HTTP server. It is located in the /etc/httpd/conf/ directory and contains all the settings and directives for the server. The other options listed (/etc/apache.conf and /etc/apache/httpd.conf) are not standard locations for the Apache configuration file and are therefore incorrect.
17.
Mary
is a system administrator in your organization. She has recently made changes to
the DHCP configuration file, but the DHCP daemon does not seem to recognize the
new changes. What should she do?
Correct Answer
C. Restart the DHCP daemon.
Explanation
Mary has made changes to the DHCP configuration file, but the DHCP daemon does not recognize the new changes. In order for the changes to take effect, Mary should restart the DHCP daemon. Restarting the daemon will reload the configuration file and apply the changes that Mary made.
18.
Correct Answer(s)
A. Lock the server in a server closet.
C. Set a BIOS password on the server.
Explanation
Locking the server in a server closet and setting a BIOS password on the server are both physical security measures that can help prevent unauthorized access to the server. Locking the server in a server closet ensures that only authorized personnel have physical access to the server. Setting a BIOS password adds an extra layer of protection by requiring a password to access the server's BIOS settings, preventing unauthorized configuration changes or access to the server's hardware. These measures help enhance the overall security of the server and protect against potential threats.
19.
Which
of the following are stand-alone daemons? (Choose all that apply.)
Correct Answer(s)
A. Apache (httpd)
D. DNS (named)
Explanation
The stand-alone daemons in this list are Apache (httpd) and DNS (named). A daemon is a background process that runs continuously and provides specific services. Apache (httpd) is a web server daemon that handles HTTP requests and serves web pages. DNS (named) is a domain name system daemon that translates domain names into IP addresses. FTP (in.ftpd) and telnet (in.telnetd) are not stand-alone daemons as they require additional software or protocols to function properly.