Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 Before customizing a kernel, you should clean the directories associated with the source code by using which command? Question 1 options: make sanitized

QUESTION 1

Before customizing a kernel, you should clean the directories associated with the source code by using which command?

Question 1 options:

make sanitized
make clean
make menuconfig
make fresh

Question 2

True or False? The /etc/sysctl.conf file should have an appropriate and separate stanza for each kernel installed on the system.

Question 2 options:

True
False

Question 3

True or False? Some enterprise-ready Linux distributions are released with slightly older kernels, which supports a longer period of testing with a stable kernel.

Question 3 options:

True
False

Question 4

True or False? Shared Network File System (NFS) directories are configured in the /etc/exports file.

Question 4 options:

True
False

Question 5

True or False? Apache processes should be configured and owned by a single unprivileged user.

Question 5 options:

True
False

Question 6

Latisha is a Linux administrator. She is remotely accessing a Linux server at a location without high-speed Internet over an Integrated Services Digital Network (ISDN) connection. This is still fast enough for her to perform command-line administration. What manages her login to the remote server?

Question 6 options:

Auth0
Public switched telephone network (PSTN)
Remote Authentication Dial In User Service (RADIUS)
Single sign-on (SSO)

Question 7

Joon is setting up a Network File System (NFS) share of the /backups/ directory with the system's Internet Protocol (IP) address and subnet mask. The share is read-write, with the reads and writes done synchronously. What command does he enter to express this?

Question 7 options:

/backups 192.168.0.0/255.255.255.0(rw,sync)
/backups/ 192.168.0.0/255.255.255.0 rw;sync
backups/gss/ 192.168.0.0/255.255.255.0rw,sync
dir/backups 192.168.0.0/255.255.255.0(rw,sync)

Question 8

Greg is a network security administrator for an online retailer. He suspects a malicious party is attempting to breach the HTTPS protocol and capture usernames, passwords, and other personal information. Which port number is he monitoring to detect malicious activity?

Question 8 options:

21
23
80
443

Question 9

True or False? Reverse path filtering is used to customize a kernel.

Question 9 options:

True
False

Question 10

True or False? Nginx is a type of proxy server.

Question 10 options:

True
False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Optimization Of Logistics And Supply Chain Systems Theory And Practice

Authors: Turkay Yildiz

1st Edition

1540716198, 978-1540716194

More Books

Students also viewed these General Management questions