Question
QUESTION 1 Before customizing a kernel, you should clean the directories associated with the source code by using which command? Question 1 options: make sanitized
QUESTION 1
Before customizing a kernel, you should clean the directories associated with the source code by using which command?
Question 1 options:
make sanitized | |
make clean | |
make menuconfig | |
make fresh |
Question 2
True or False? The /etc/sysctl.conf file should have an appropriate and separate stanza for each kernel installed on the system.
Question 2 options:
True | |
False |
Question 3
True or False? Some enterprise-ready Linux distributions are released with slightly older kernels, which supports a longer period of testing with a stable kernel.
Question 3 options:
True | |
False |
Question 4
True or False? Shared Network File System (NFS) directories are configured in the /etc/exports file.
Question 4 options:
True | |
False |
Question 5
True or False? Apache processes should be configured and owned by a single unprivileged user.
Question 5 options:
True | |
False |
Question 6
Latisha is a Linux administrator. She is remotely accessing a Linux server at a location without high-speed Internet over an Integrated Services Digital Network (ISDN) connection. This is still fast enough for her to perform command-line administration. What manages her login to the remote server?
Question 6 options:
Auth0 | |
Public switched telephone network (PSTN) | |
Remote Authentication Dial In User Service (RADIUS) | |
Single sign-on (SSO) |
Question 7
Joon is setting up a Network File System (NFS) share of the /backups/ directory with the system's Internet Protocol (IP) address and subnet mask. The share is read-write, with the reads and writes done synchronously. What command does he enter to express this?
Question 7 options:
/backups 192.168.0.0/255.255.255.0(rw,sync) | |
/backups/ 192.168.0.0/255.255.255.0 rw;sync | |
backups/gss/ 192.168.0.0/255.255.255.0rw,sync | |
dir/backups 192.168.0.0/255.255.255.0(rw,sync) |
Question 8
Greg is a network security administrator for an online retailer. He suspects a malicious party is attempting to breach the HTTPS protocol and capture usernames, passwords, and other personal information. Which port number is he monitoring to detect malicious activity?
Question 8 options:
21 | |
23 | |
80 | |
443 |
Question 9
True or False? Reverse path filtering is used to customize a kernel.
Question 9 options:
True | |
False |
Question 10
True or False? Nginx is a type of proxy server.
Question 10 options:
True | |
False |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started