ECCouncil 212-77 - Linux Security
You inadvertently change the permission block on /usr/bin/passwd command to
-r-xr-xr-x.
What would be the effect of this change?
Which command creates a file system in Linux?
An irreparably corrupt ext2 filesystem requires running
One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?
You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?
You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a
and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?
Which of the following lines would log all messages from news to the file /var/log/newslog?
You want to know how long each user's session was the last time they logged on.
Which of the following log files contains this information?
Which of the following are risks of SUID and SGID programs? (Choose two)
As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory. Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?