Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 212-77 - Linux Security

Page: 1 / 2
Total 51 questions

You inadvertently change the permission block on /usr/bin/passwd command to

-r-xr-xr-x.

What would be the effect of this change?

A.

No changes in how the command runs would occur.

B.

Users could no longer change their passwords because they do not have write permissions to /etc/passwd.

C.

Users' passwords would not expire.

D.

Shadow passwords would quit working.

Which command creates a file system in Linux?

A.

CRFS

B.

FS

C.

FDISK

D.

MKFS

An irreparably corrupt ext2 filesystem requires running

A.

fdisk

B.

mkfs

C.

newfs

D.

fsck

One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?

A.

Someone is using your Web site to test their connectivity to the Internet.

B.

Someone is using a DoS attack on your Web site.

C.

There is no problem; this is normal traffic from DNS servers and Internet routers checking connectivity to your Web site.

D.

There is insufficient capacity on the Internet connection to your Web site.

You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?

A.

end

B.

CTRL-ALT-DEL

C.

stop

D.

wait

E.

kill

You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a

and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?

A.

You did not assign a valid password to Mary's account.

B.

You did not set the appropriate permissions to her home directory.

C.

You did not create her home directory.

D.

You cannot create a new user account by manually editing the /etc/passwd file.

Which of the following lines would log all messages from news to the file /var/log/newslog?

A.

news.* /var/log/newslog

B.

news.!* /var/log/newslog

C.

news.*;news.!=info /var/log/newslog

D.

*news /var/log/newslog

You want to know how long each user's session was the last time they logged on.

Which of the following log files contains this information?

A.

/var/log/utmp

B.

/var/log/usrlog

C.

/var/log/wtmp

D.

/var/log/lastlog

Which of the following are risks of SUID and SGID programs? (Choose two)

A.

Bugs in the programs may cause more damage than they would in ordinary programs.

B.

The program files are large and thus may cause a disk to run out of space.

C.

Because the programs require password entry, running them over an insecure network link runs the risk of password interception.

D.

Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible.

As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory. Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?

A.

ln /opt/test/antiterror /opt/bin/antiterror-7/antiterror-7

B.

ln antiterror /opt/bin/antiterror-8/antiterror-8

C.

ln /opt/test/antiterror.lnk /opt/bin/antiterror-8/antiterror-8

D.

ln /opt/test/antiterror /opt/bin/antiterror-8/antiterror-8