Answers, Braindumps (212-77)
I had enjoyed
the paper after getting help from the dumps of www.braindumps.org.
Here is my contribution.
Which of the following is true of Linux passwords?
A. They are changed with the password utility.
B. They must be changed once a month.
C. They may consist only of lowercase letters and
D. They may be changed by the user who owns an account
or by root.
Assume that you have just logged on as a regular user.
Which of the following commands allows you to edit
the file with user passwords associated with the Shadow
A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd
Under the bash shell which is the most appropriate
place to set environment variables that apply to all
Which of the following measures is the most effective
way to prevent attacks through various network services?
A. Disable a service in the appropriate /etc/xinetd.d
B. Use a firewall to drop all requests to unneeded
C. Block service requests with the appropriate commands
D. Uninstall unneeded network services.
Which of the following statements applies to the IP
A. It is reserved.
B. It cannot be assigned to a host that accesses the
C. It is designated for multicast transmission.
D. It can be freely assigned to a host on a private
Which of the following are ways to disable dynamic
A. The linuxconf Gated Daemon screen
B. The linuxconf Routed Daemon screen
C. echo "0" > /proc/sys/net/ipv4/dynamic_routing
D. Editing /etc/sysconfig/network-scripts
Which of the following is not a Linux DHCP client?
How should you engage users in helping to secure your
A. Educate them about the importance of security,
the means of choosing good passwords, and the ways
crackers can obtain passwords.
B. Instruct your users to e-mail copies of their passwords
to themselves on other systems so that they're readily
available in case of an emergency.
C. Enforce password change rules but don't tell users
how crackers obtain passwords since you could be educating
a future cracker.
D. Give some of your users copies of the encrypted
database file as backup in case a cracker breaks in
and corrupts the original.
Which of the following are risks of SUID and SGID
programs? (Choose two)
A. Bugs in the programs may cause more damage than
they would in ordinary programs.
B. The program files are large and thus may cause
a disk to run out of space.
C. Because the programs require password entry, running
them over an insecure network link runs the risk of
D. Users may be able to abuse a program's features,
thus doing more damage than would otherwise be possible.