You are on page 1of 8

INFO 3510

Adv Linux

Test 1

13 All posfix deamons have distint areas of responsibility. All deamons processes are created as needed,
and are supervised by a mother deamon called the? Master

14. Select the routing deamon that the textbook says is DEAD. It stated out as free software but because
privatized then turned over to a development consortium that eventually disbanded? gated

15 One of the most common hybrid routing schemese is to use static routing on the ____ and dyncamic
routing on the _____? Access networks, distribution networks

16 NIS used to be called _____, but was renamed for legal reasons? Yellow pages

17. Microsoft outlook is classififed as a: MUA

18. What is the prupose of a LDIF text file? Expands the LDAP schema to include new container objects

19. File-copying systems general use either a push model or a pull model. Which of the following is best
described by the pull model? ftp or rsync

20. The fire line of any shell script muse have a #! What are these two characteers called when used
tougher to define the path to a shell script? shebang

Which of the following is NOT a common attribute name found in LDAP hierarchies? BN

Select the technique that is NOT a common method to match UIDs between NFS clients servers:? Rysnc

All email travels over the internet in the ______ format? SMTP

A common use discussed in class for the use of NFS and NIS together is to create a ____ LDAP client

28 Which of the following is NOT an advantage of a script language? It is possible to write device drives
with a scripting language

29 Tim has a simple network where his client machines have only one way out to the internet: a default
route to a lone gateway. Select the correct routing strategy level of complexity for this scenario? Static
routes only

30 In the NIS system indirect maps are unique because? they can automount several file systems under
a common directory

Routing demon that is dead

Gated
Hybrid routing schemes

Access / distribution

NIS = yellow book

Outlook is a MUA

LDIF file is used to

Update and content update

File copy systems to PULL model. = ftp or rsync

#! = shebang

Not common attribute found in LDAP

Bn

Select tech not common method to match UID between NFS client servers = rsync

Characteristics not an advantage of static routes

Unable to adapt to failures

Email travels over internet in the format of = SMTP


Peral array 0 1 2 3 4 answer is 2 bye\n

Common use discussed in class for NFS and NIS together is = C

The idea that there should be a single directory information tree with in an organization caused
the Itu-t to create a standard for directory service model called = X.500 4b

Option that declares the variable in a shell script = FIRSTNAME 5a

Storage area networks are different from dedicated nfs file server in that = they do not
understand file systems 7d,

A problem with nfs is that It happens in the clear, what protocol can provide more security for
authenticating nfs clients to nfs servers = IPSEC 10a,

Select the routing daemon that the textbook says is DEAD it started out as free software but
became privatized then turned over to a development consortium that eventually disbanded =
gated 14a

Select the properly formatted Perl Array

@items = (“socks”, “shoes”, “shorts”);

Servers that do NOT keep track of files currently open by clients are said to be

Stateless

The idea that there should be a single DIT within an org caused the ITU-T to create a standard for a
directory service model called

x.500

Select the routing daemon that the textbook says us DEAD. It started out as free software, but because
privatized, then turned over to a development consortium that eventually disbanded.

Gated

One of the most common hybrid routing schemes is to use static routing on the _______ and dynamic
routing on the __________

Access networks, distribution networks

Select the technique that is not a common method to match UID’s between NFS clients and servers

Rsync
Which of the following is NOT an advantage of a script

Device drivers are not possible theyr require a compiling language

Test 2

9. If there’s an event failure based on customized criteria, Nagios can notify the system admistrator.
Which of the following is Nagios NOT capable of doing to provide notification? Leave recorded
voicemail.

10. Why is ICMP sequence number a particularly valuable piece of information? Because a healther
network should drop few packets.

11. Object Identifiers (OIDS0) are associated with____? MIBs

12. Which free and open source standard was release by phil zimmerman’s corporation in 1998?
OpenPGP

13. given what you know about the differences between an incremental backup and differential backup
which backup method do you think would have a larger backup window? Differential Backup

14 in the simplest kind of web sever load balancing in round robin DNS it is the ____ that randomly
selects an IP address from the list of possible web servers dedicated to the domain? Stub resolver

15. select the utility that will provide a list of listening ports with the -l option? netstat

16. whcihf special permissing do you set on a directory to allow shared write access to files but delete
privkeges only to files you own? Sticky bit

17. what protocol does groups of squid servers use to share information about what the servers have
cached? ICP

18. social engeering

19. When using pretty good privacy to encrypt a message, the ____ key is used to encrypt a hash of your
message and the____ key is used to decrypt ther received hash? Private, public

31. There are four NSP operations? GET SET GET-NEXT and TRAP

Select a stool that will show you the hops that datagram took to arrive at its destination

Tracert (traceroute)

In snmp community is really just another term for

password

Please identify the pluggable authentication module


pam nolgoin.so

Select the pam module type parameter that would restrict root logins to the console

Account

Select the linux sysadmin command used to enforce p[assword expiration dates

chage

The authorative free snmp imple\mentation for unix and linuz produced by the university of
California davis is called

Snmp - msnap

The above graph is a sample report from which network management program

nagios

A type of malicious hacker known for their lack of technical sophistication that is most likely to
use a rootkit is a

Script kiddie

While a software program writes data to a buffer it overruns the buffer’s boundary and
overwrites adjacent memory, this is called

Buffer overflow

Which of the following is not considered a local security technique

Trap snmp events with nagios

Before you can ask a bona fide certificate autheority to sign your certificate

Certificate signing request

There are four snmp operations

Get

set

Get-next

What is the missing operation


trap

Given the wireshark capture and the packet detail pane what fram type is this pop packet using

EthernetII

Select the utility that will provide a list of ports with the –l option

Netstat

Which special permissionsdo you set on a dir to allow shared write acces to files, but del priv only to files
you own

Sticky bit

What protocol does groups of squid servers use to share information about whatthe sservers have
cached?

Internet cache Protocol

John was disgruntled former employee……

Social engineering

When using pretty good privacy e\to encrypt a message, the _____ key is used to encrypt a hash of your
message and the ______ key is used to decrypt the receuived hash

Private, public.

Select the tool that will show you the hops the datagram took to arrive at its destination

Traceroute

In snmp, community is really just another term for ________

Password

Please identify the PAM

Pam_nologin.so

Select the PAM module type parameter that would restrict root logins to the console

Account

Select linux sysadmin command used to enforce password expiration dates


Chage

The authoritative free snmp implementation for unix and linux produced by the Univ of Cal, Davis UV
DAVIS is called_____________

NET-SNMP

The above graph is a sample report from which net mgmt. program

Nagios

A type of malic hacker known for lack of sckill

kiddie

Which of the following files is known as a TCP wrapper =

To keep cleaver hackers form erasing their tracks in log files. What tech is used to parse forwarded
events =

According to class discussion and the list presented by textbook authors what is the first thing you check
= Ping 127.0.0.1

Which of the following network intrusion detec sys is easiest to configure and considered a good starter
choice = snort

Which task do the authors of the text say is highest value secur choice = keep system patched and up to
date

What comp virus made sys admins relize security was an issue = Morris Worm

A reasonable approach to patching shoud include several elements what does not belong = keep reg
sched for installing routine patches

The first step in setting up a vi5rtual host for HTTpd in Ubuntu = setup virtual interface

If theres an event failure. Nagios can notfify yuou . what is Nagios not capableof doing = levve recorded
voicemail.

Why is ICMP sequence number a particulary valuable piece of info = IP gurantees deleivery and
deleivery verification

Object Identifiers are associated with = MIBs

Which free and open source standard was released by Zimmerman corp in 98 = OpenPGP

What back up method has larger backup window incremental or differential = incremental
In simplest kind of web server load balancing, round robin DNS it is the =authoritive DNS server for the
domain

You might also like