Professional Documents
Culture Documents
Adv Linux
Test 1
13 All posfix deamons have distint areas of responsibility. All deamons processes are created as needed,
and are supervised by a mother deamon called the? Master
14. Select the routing deamon that the textbook says is DEAD. It stated out as free software but because
privatized then turned over to a development consortium that eventually disbanded? gated
15 One of the most common hybrid routing schemese is to use static routing on the ____ and dyncamic
routing on the _____? Access networks, distribution networks
16 NIS used to be called _____, but was renamed for legal reasons? Yellow pages
18. What is the prupose of a LDIF text file? Expands the LDAP schema to include new container objects
19. File-copying systems general use either a push model or a pull model. Which of the following is best
described by the pull model? ftp or rsync
20. The fire line of any shell script muse have a #! What are these two characteers called when used
tougher to define the path to a shell script? shebang
Which of the following is NOT a common attribute name found in LDAP hierarchies? BN
Select the technique that is NOT a common method to match UIDs between NFS clients servers:? Rysnc
All email travels over the internet in the ______ format? SMTP
A common use discussed in class for the use of NFS and NIS together is to create a ____ LDAP client
28 Which of the following is NOT an advantage of a script language? It is possible to write device drives
with a scripting language
29 Tim has a simple network where his client machines have only one way out to the internet: a default
route to a lone gateway. Select the correct routing strategy level of complexity for this scenario? Static
routes only
30 In the NIS system indirect maps are unique because? they can automount several file systems under
a common directory
Gated
Hybrid routing schemes
Access / distribution
Outlook is a MUA
#! = shebang
Bn
Select tech not common method to match UID between NFS client servers = rsync
The idea that there should be a single directory information tree with in an organization caused
the Itu-t to create a standard for directory service model called = X.500 4b
Storage area networks are different from dedicated nfs file server in that = they do not
understand file systems 7d,
A problem with nfs is that It happens in the clear, what protocol can provide more security for
authenticating nfs clients to nfs servers = IPSEC 10a,
Select the routing daemon that the textbook says is DEAD it started out as free software but
became privatized then turned over to a development consortium that eventually disbanded =
gated 14a
Servers that do NOT keep track of files currently open by clients are said to be
Stateless
The idea that there should be a single DIT within an org caused the ITU-T to create a standard for a
directory service model called
x.500
Select the routing daemon that the textbook says us DEAD. It started out as free software, but because
privatized, then turned over to a development consortium that eventually disbanded.
Gated
One of the most common hybrid routing schemes is to use static routing on the _______ and dynamic
routing on the __________
Select the technique that is not a common method to match UID’s between NFS clients and servers
Rsync
Which of the following is NOT an advantage of a script
Test 2
9. If there’s an event failure based on customized criteria, Nagios can notify the system admistrator.
Which of the following is Nagios NOT capable of doing to provide notification? Leave recorded
voicemail.
10. Why is ICMP sequence number a particularly valuable piece of information? Because a healther
network should drop few packets.
12. Which free and open source standard was release by phil zimmerman’s corporation in 1998?
OpenPGP
13. given what you know about the differences between an incremental backup and differential backup
which backup method do you think would have a larger backup window? Differential Backup
14 in the simplest kind of web sever load balancing in round robin DNS it is the ____ that randomly
selects an IP address from the list of possible web servers dedicated to the domain? Stub resolver
15. select the utility that will provide a list of listening ports with the -l option? netstat
16. whcihf special permissing do you set on a directory to allow shared write access to files but delete
privkeges only to files you own? Sticky bit
17. what protocol does groups of squid servers use to share information about what the servers have
cached? ICP
19. When using pretty good privacy to encrypt a message, the ____ key is used to encrypt a hash of your
message and the____ key is used to decrypt ther received hash? Private, public
31. There are four NSP operations? GET SET GET-NEXT and TRAP
Select a stool that will show you the hops that datagram took to arrive at its destination
Tracert (traceroute)
password
Select the pam module type parameter that would restrict root logins to the console
Account
Select the linux sysadmin command used to enforce p[assword expiration dates
chage
The authorative free snmp imple\mentation for unix and linuz produced by the university of
California davis is called
Snmp - msnap
The above graph is a sample report from which network management program
nagios
A type of malicious hacker known for their lack of technical sophistication that is most likely to
use a rootkit is a
Script kiddie
While a software program writes data to a buffer it overruns the buffer’s boundary and
overwrites adjacent memory, this is called
Buffer overflow
Before you can ask a bona fide certificate autheority to sign your certificate
Get
set
Get-next
Given the wireshark capture and the packet detail pane what fram type is this pop packet using
EthernetII
Select the utility that will provide a list of ports with the –l option
Netstat
Which special permissionsdo you set on a dir to allow shared write acces to files, but del priv only to files
you own
Sticky bit
What protocol does groups of squid servers use to share information about whatthe sservers have
cached?
Social engineering
When using pretty good privacy e\to encrypt a message, the _____ key is used to encrypt a hash of your
message and the ______ key is used to decrypt the receuived hash
Private, public.
Select the tool that will show you the hops the datagram took to arrive at its destination
Traceroute
Password
Pam_nologin.so
Select the PAM module type parameter that would restrict root logins to the console
Account
The authoritative free snmp implementation for unix and linux produced by the Univ of Cal, Davis UV
DAVIS is called_____________
NET-SNMP
The above graph is a sample report from which net mgmt. program
Nagios
kiddie
To keep cleaver hackers form erasing their tracks in log files. What tech is used to parse forwarded
events =
According to class discussion and the list presented by textbook authors what is the first thing you check
= Ping 127.0.0.1
Which of the following network intrusion detec sys is easiest to configure and considered a good starter
choice = snort
Which task do the authors of the text say is highest value secur choice = keep system patched and up to
date
What comp virus made sys admins relize security was an issue = Morris Worm
A reasonable approach to patching shoud include several elements what does not belong = keep reg
sched for installing routine patches
The first step in setting up a vi5rtual host for HTTpd in Ubuntu = setup virtual interface
If theres an event failure. Nagios can notfify yuou . what is Nagios not capableof doing = levve recorded
voicemail.
Why is ICMP sequence number a particulary valuable piece of info = IP gurantees deleivery and
deleivery verification
Which free and open source standard was released by Zimmerman corp in 98 = OpenPGP
What back up method has larger backup window incremental or differential = incremental
In simplest kind of web server load balancing, round robin DNS it is the =authoritive DNS server for the
domain