Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 212-77 - Linux Security

Page: 2 / 2
Total 51 questions

Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?

A.

vi /etc/shadow

B.

sudo -c "vi /etc/shadow"

C.

su -c "vi /etc/shadow"

D.

visu vi /etc/passwd

What is the name of the file that contains encrypted hashes of passwords on a Linux system?

A.

/etc/shadow

B.

/etc/.passwd

C.

/etc/passwd

D.

/.secure/.htaccess

Which statement describes the cron daemon?

A.

Manages scheduling of routine system tasks

B.

Manages all incoming connections and spawns off child processes

C.

Is responsible for file sharing across a network

D.

Keeps track of system messages and errors

E.

Manages the printing subsystem

Which of the following umask values will result in files with rw-r----- permissions?

A.

640

B.

022

C.

210

D.

027

Which of the following statements applies to the IP address 192.168.0.1?

A.

It is reserved.

B.

It cannot be assigned to a host that accesses the Internet.

C.

It is designated for multicast transmission.

D.

It can be freely assigned to a host on a private network