THE FOLLOWING COMPTIA LINUX+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Which command will create an image of the Which command will watch the Apache log at You receive a file with a Which of the following commands will correctly change the group ownership of the file called Which option to According to the FHS, what is the correct location for site-specific data for a server? Which of the following commands enables the sticky bit for a user on a file called The Which option to Which option to A command has the following listing obtained with -rwsr-xr-x 1 suehring suehring 21 Nov 2 13:53 script.sh What does the When sourcing a file in bash, which Which of the following commands removes an expiration from an account? You need to determine whether LDAP integration is working correctly. In order to do so, you would like to obtain a list of users, as read by Which file contains a list of users who are not allowed to create Which system logging facility is used for messages from the kernel? Which of the following commands is used to examine the What is the name of the Which configuration option in Assuming that the Which option in You are deploying an Exim server and need to work with the firewall to ensure that the proper incoming ports are open. Which protocol and port should you allow inbound for normal SMTP traffic? Which option within a Which port(s) and protocol(s) should be opened in a firewall in order for the primary and secondary name servers to communicate for a given domain? When examining open ports on the server, you see that TCP port 3000 is listed with no corresponding protocol name, such as On which port does ICMP operate? Which of the following protocols uses a three-way handshake? Which of the following commands displays account information such as expiration date, last password change, and other related details? Which command is used to create a public/private key pair for use with SSH? Within which file should you place public keys for servers from which you will accept key-based SSH authentication? You need to execute a command as a specific user. Which of the following commands enables this to occur? Which option in Which of the following commands will display the CPU time, memory, and other limits for the currently logged-in user? When working with TCP wrappers, which line within the You are using an RSA-based key pair for SSH. By default, what is the name of the private key file in Which option to the After specifying the key server, which option to Which of the following commands should be used to edit the Which file can be used to store a server-wide cache of hosts whose keys are known for SSH? Which option must be enabled in Which of the following commands generates a GnuPG key pair? You need to disable a service found in Which file is used as the default storage for public keyrings for Which option to the Which key-derivation function is used by LUKS? Which of the following commands is used to configure Which wildcard can be used in Which option to the Which option to Which of the following files should be used to display a message to users prior to logging in locally? Which option to the When creating a Which file contains a message that is displayed after successful login? Which of the following options to the Which of the following files can be used to provide a message to users logging in remotely with a protocol such as telnet? Which option to the Which of the following options to Which option to the Which option to When configuring BIND for a Which algorithm must be used for Which option enables SSL configuration for a given website or server? On which port does Squid listen by default? When using the Within which directory are individual configuration files stored for the Pluggable Authentication Module mechanism? On which port does the Which PAM module prevents logins from accounts other than root when the file Which PAM module is responsible for normal or standard password authentication? Which PAM module provides a mechanism for checking and enforcing the strength of passwords in order to enforce a password policy? Which format should the certificate and key be in for a Postfix TLS configuration? Which Which of the following commands saves the current set of Which of the following commands lists the current Which of the following directories contains configuration files for the Within an OpenSSH configuration, which option disables the use of empty passwords? Which of the following commands sets the default policy for the On which port and protocol does OpenVPN listen? Which of the following best describes the difference between the Which of the following partial Which of the following partial Which of the following partial Which of the following partial Which of the following commands enables forwarding such as would be used for NAT? Within a jail configuration for Which command sends a copy of the public key identity to another server for use with SSH? Which option in Which port should be allowed through a firewall for NTP communication? Which options are encompassed when the You are looking for files related to the SSL configuration on the server. After looking in Which OpenSSH configuration directive is used to specify the users who will be allowed to log in using SSH? Which option within a Within the SELinux configuration, which option controls whether the policy will be targeted or strict? Which of the following best describes the status of SELinux when the command Which of the following describes the primary difference between the configuration files When working with PAM, a module that is marked as What is the UID of the root account? Using a system such as Google Authenticator to provide two-factor authentication is an example of which type of token? You need to disable the ability to reboot the Linux computer using the Ctrl+Alt+Del key combination. Within which file will you find the configuration for this key combination? Within which directory are the predefined zones for You need to set a bootloader password for GRUB. To do so, which of the following configuration options should be set in Assuming that the output from the Your organization uses Which of the following commands is used to display information about the access control list for a given file? Which of the following commands can be used to prevent the root user from logging in at the console? You need to provide a special username and other parameters related to a specific host to which you connect using SSH. To which file should you add this information? You are using Which of the following commands can be used to obtain more information about a GUID partition table? Which option to When working with AppArmor, within which directory are profiles located? Which of the following protocols provides datagram security? Which of the following commands shows a list of failed login attempts? When using Kerberos authentication, which of the following commands shows the ticket cache? You suspect that a third-party logging agent is using a significant amount of system resources. Which of the following commands could help troubleshoot this issue? Which of the following options to the Which option to Which AppArmor command uses Which group can be used to restrict access to execute the You need to change the SELinux security context of a file. Which of the following commands should be used for this purpose? Which of the following is an advantage of using an SSL-based VPN client? When configuring PKI on a Red Hat system, which options are available as hashing algorithms when RSA is used as a key type? Which type of backup captures changes from the previous backup and only backs up those files that have changed? Two individuals within your organization share the same username and password for an administrative account. Which security best practice does this violate? Which of the following passwords can be used to secure a system such that it will not boot, even if the attacker has physical access to place a USB boot disk in the computer? Which of the following can be used in Linux to provide biometric authentication? Which option to the You need to allow a user to edit a file that is owned by root. Which of the following commands should be used for this purpose, assuming the use of You need to view the SELinux contexts for various processes on the system. Which of the following commands will accomplish this task? Which PAM module can be used to lock accounts after failed login attempts? Which VPN mode is typically used for client-to-server VPN traffic? What is the device-naming convention used to indicate a pseudo-terminal in Linux? Which of the following commands places all AppArmor profiles into complain mode? Which of the following logs is used to store information related to authentication and authorization? Which option within the RADIUS provides AAA services for remote login. To what does AAA refer? Which option to the One of your customers needs to transfer a large file and is asking for FTP to be enabled on the server. Thinking of security, what options can you offer that are more secure? Which site should you use to monitor for new security bulletins that have been reported using the CVE process? When working with Which daemon can be used to monitor the system for changes to system files? You need to provide authentication for various network components like routers and switches within the enterprise network. Which authentication service can be added to the Linux server to facilitate this scenario? Which of the following is the name for the firewall control software associated with Netfilter? You need to extract files from a backup created with an older version of HPUX. The When copying files using You are viewing the contents of a directory with the You believe that the system has been broken into and files may have been changed. After taking the system offline and unmounting one of the affected partitions, what could you do next? Which option to SSH specifies the private key to use for authentication? Which utility can be used to create a checksum of a file in order to ensure its integrity? Which option to the You are working on a Debian system and need to set ownership on a file such that the user used to execute Apache can write to the file. What command can you use to determine which user Apache is running as? You have found that the owner of the Apache process is When using On which port does telnet operate? Which command is used to turn off AppArmor profiles? Which command and option are used to view the SELinux security context of a given file? Digital signatures can be provided in Linux through which of the following commands? You need to make a change to the global behavior of AppArmor. Rather than editing the profiles directly, which directory contains common settings that can be changed instead? Which of the following directories contains configuration for Which software can be used in connection with You have created a public key and private key for use with SSH. The contents of which key should be copied to a remote host in order to enable authentication? What is the octal notation to specify that a directory should have read-write-execute permissions for the owner and read-execute permissions for the group and other? When using Which option to Which option to Which option within an SSH server configuration enables authentication using Kerberos? You are working with Ports below what number are considered to be the well-known ports? Within which directory will you find configuration files for various logs that are to be rotated with Which option to the Which PAM module is responsible for enforcing limits such as the maximum number of logins and CPU time used? When using LDAP for authentication, what will be logged with the On which port does LDAP over SSL listen for connections? Which of the following PAM modules can be used for authorization and authentication scenarios using external files? Which option to
chmod
chown
chgrp
getfacl
setfacl
ls
ulimit
chage
setenforce
getenforce
sestatus
setsebool
getsebool
chcon
restorecon
ls -Z
ps -Z
aa-disable
aa-complain
aa-unconfined
/etc/apparmor.d/
/etc/apparmor.d/tunables
su
sudo
wheel
visudo
sudoedit
/etc/pam.d/
pam_tally2
faillock
~/.ssh/
known_hosts
authorized_keys
config
id_rsa
id_rsa.pub
/etc/sshd/
ssh.conf
sshd.conf
ssh-copy-id
ssh-keygen
ssh-add
/etc/securetty
/dev/tty#
kinit
klist
/var/log/secure
/var/log/messages
/var/log/[application]
/var/log/kern.log
logrotate
/etc/rsyslog.conf
journald
journalctl
lastb
firewalld
iptables
ufw
/etc/default/ufw
/etc/ufw/
/proc/sys/net/ipv4/ip_forward
/proc/sys/net/ipv6/ip_forward
/etc/services
tar
cpio
dd
gzip
xz
bzip2
zip
rsync
/dev/sda1
disk partition and place that image into a file called output.img
?
dd if=sda of=/dev/sda1
dd if=output.img of=/dev/sda1
dd if=/dev/sda1 of=output.img
echo /dev/sda1 > output.img
/var/log/httpd/access.log
and continually scroll as new log entries are created?
watch /var/log/httpd/access.log
tail /var/log/httpd/access.log
tail -f /var/log/httpd/access.log
mon /var/log/httpd/access.log
.lzma
extension. Which command can you use to decompress this file?
xz
lz
gz
bzip
a.out
to users?
chgrp users a.out
chgrp a.out users
groupchg a.out users
grpchg users a.out
umask
will display the permissions to be used in a POSIX format?
-P
-p
-S
-v
/etc
/var
/tmp
/srv
homescript.sh
?
chmod +sticky homescript.sh
chmod 755 homescript.sh
chmod u+s homescript.sh
chown u+sticky homescript.sh
umask
reports as 022. What is the permission that will be in effect for a newly non-executable created file?
u+rw, g+r, w+r
755
022
a+r
chown
recursively changes the ownership?
-f
-R
-a
-m
chgrp
will change group ownership of all files within a given directory?
-directory
-d
-R
-V
ls -la
:s
denote within the user permissions in the listing?
suid
bit has been set for this program.chmod
command would be necessary to provide the minimum privileges in order for the file to be sourced correctly, assuming that your current user owns the file?
chmod 600
chmod 755
chmod 777
chmod 400
sudo chage -l username
sudo chage -E -1 username
sudo chage -E now username
sudo chage --noexpire username
/etc/nsswitch.conf
. Which command can be used for this purpose?
getuser
getent
usermod
userlist
cron
scheduled tasks?
/etc/cron.users
/etc/cron.deny
/etc/cron.allow
/etc/cron.userlist
syslog
kernel
kern
system
systemd
journal or log file?
journallist
ctlj
journalctl
jctl
systemd
service that provides logging facilities?
systemd-journald
systemd-loggingd
systemd-syslog
systemd-logger
/etc
/logrotate.conf
will cause the log to be emailed to [email protected] when the log rotation process runs for the selected log?
mail
[email protected]sendmail
[email protected]maillog
[email protected]logmail
[email protected]$ModLoad imudp
configuration option has been set in the /etc/rsyslog.conf
configuration file for rsyslogd
, which of the following additional options is necessary to configure the port on which the server will listen?
$Port 514
$UDPServerRun 514
$Listen 514
$UDPListen 514
journald.conf
controls the maximum file size for individual journal logs?
SystemMaxFileSize
MaxFile
LogFileSize
LogSize
logrotate
configuration file disables compression of the log file?
compressoff
limitcompress
nocompression
nocompress
udp/53
Both tcp/53 and udp/53
tcp/53
udp/53 and tcp/503
smtp
, imaps
, and so on. In which file would you find a list of port-to-protocol translations that could be customized to add this new port?
/etc/ports
/etc/p2p
/etc/ppp
/etc/services
usermod -l
userinfo -a
chageuser -l
chage -l
ssh -k
ssh-keygen
ssh-genkey
ssh -key
~/.ssh/authorized_keys
~/.ssh/keys
~/.ssh/keyauth
~/.sshd/authkeys
sudo -u
sudo -U
sudo -s
sudo -H
/etc/sudoers
will cause the specified command to not prompt for a password?
PASSWORD=NO
NOPASSWD
NOPASSWORD
NOPROMPT
reslimit
limitres -a
ulimit -a
proclimit -n
/etc/hosts.deny
file will prevent any host within the 192.168.1.0/24 network from accessing services that operate from xinetd
?
BLOCK: 192.168.1.0/24
REJECT: 192.168.1.0
ALL: 192.168.1.0/255.255.255.0
NONE: 192.168.1/255.255.255.0
~/.ssh
?
id_rsa
id_rsa.priv
id_rsa.key
rsa_key.priv
su
command will execute a single command with a non-interactive session?
-s
-u
-c
-e
gpg
is used to specify the key to send to the key server?
key-name
keyname
send-key
sendkey
/etc/sudoers
file?
editsudo
visudo
visudoers
/etc/sshd_known_hosts
/etc/ssh_known_hosts
~/.ssh/known_hosts
/root/ssh_known_hosts
/etc/sshd/sshd.conf
(or /etc/ssh/sshd_config
) on the destination server in order for X11 forwarding to work?
XForward yes
Xenable yes
X11Forwarding yes
Xconnection yes
gpg --gen-key
gpg --key
gpg --send-key
gpg --create-key
/etc/inetd.conf
. Which of the following is used as a comment character in that file?
-
#
/
%
gpg
?
publickeys.gpg
pubring.gpg
public.gpg
pubkeys.gpg
su
command is used to obtain the normal login environment?
-u
-U
-
-login
dm-crypt
volumes?
cryptsetup
dm-cryptsetup
dm-setup
dm-crypts
/etc/hosts.allow
to specify a match for a host whose name does not match its IP address?
*
ALL
PARANOID
NAMEMATCH
tar
command creates a tar
file?
-c
-b
-f
-d
tar
removes files after adding them to the archive?
-r
-d
--remove-files
-f
/etc/loginmesg
/etc/logmessage.txt
/etc/issue
/etc/banner
rsync
command, when used in archive mode, will remove files that no longer exist on the host?
--delete
--remove
-del
-rem
tar
archive, you need to exclude certain files from the archive. Which option facilitates this scenario?
-x
--exclude
--ex
--remove
/etc/loginbanner
/etc/issue
/etc/motd
/etc/message
tar
command can be used to uncompress a file that has been compressed using gzip
?
-z
-x
-c
-f
/etc/telnet.msg
/etc/issue.net
/etc/login.msg
/etc/telnet.login
rsync
command changes the resolution for determining file modifications?
--mod-time
--modify-time
--mod-res
--modify-window
bzip2
sends the output to STDOUT
?
-s
-c
-d
-f
gzip
command will suppress all warning messages and might be useful in a situation where output is not appropriate?
-v
-q
-L
-r
rsync
specifies that the remote shell or transport for the synchronization process should use SSH?
-t ssh
--overssh
-e ssh
-F ssh
chroot
jail scenario, within which of the following files should the home
directory be set for the chroot
user to use with bind?
/etc/bind.home
/etc/bind.user
/etc/passwd
/etc/bindauth
rndc
authentication when generating a key with dnssec-keygen
?
sha1
sha256
md5
hmac-md5
SSLEngine
SSLDirect
SSLEnable
SSLConnect
net
command in an Active Directory environment, which option enables authentication using Kerberos?
-b
-k
-l
-a
/etc/pamd
/etc/pam
/etc/pam.d
/etc/pam.conf.d
slapd
LDAP daemon listen for connections?
/etc/nologin
exists?
pam_login.so
pam_preventlogin.so
pam_nologin.so
pam_logindef.so
pam_auth.so
pam_login.so
pam_unix.so
pam_standardlogin.so
pam_passwdstr.so
pam_cracklib.so
pam_libpasswd.so
pam_strpass.so
iptables
chain is used to create a port redirect?
REDIRECT
PREROUTING
PORTREDIR
ROUTING
iptables
rules into a file?
save-iptables
iptables-create
iptables-save
ipt-save
iptables
rules, while not attempting to resolve host or port names?
iptables -L
iptables -List -no-resolve
iptables -a
iptables -nL
fail2ban
system?
/etc/fail2ban.cfg
/etc/fail2ban.d
/etc/f2b
/etc/fail2ban
DisableEmptyPass
PermitEmptyPasswords
EmptyPasswordAuth
PermitPasswordLength
INPUT
chain to discard packets that don’t have a specific rule allowing them?
iptables INPUT DROP
iptables chain INPUT policy DROP
iptables -P INPUT DROP
iptables POLICY=DROP CHAIN=INPUT
DROP
and REJECT
targets in iptables
?
DROP
and REJECT
do the same thing.DROP
silently discards packets, while REJECT
sends back an ICMP acknowledgement.REJECT
silently discards packets, while DROP
sends back an ICMP acknowledgement.DROP
sends back a direct message, and REJECT
sends a redirect.iptables
rules sets up a configuration that limits log entries to three per minute?
-m limit 3 -j LOG
-m limit --limit 3/minute --limit-burst 3 -j LOG
-m limit --limit 3
-m limit --limit-minute 3 --burst 3 -j LOG
iptables
rules allows incoming ICMP traffic?
-A INPUT -p ICMP -j ACCEPT
-A IN -P ICMP
-A INPUT -P ACCEPT-ICMP
-A IN -P ICMP -j ACCEPT
iptables
rules blocks all traffic from source IP 192.168.51.50?
-A INPUT -p ALL 192.168.51.50 -j ACCEPT
-A INPUT -p ALL -s 192.168.51.50 -j DROP
-A INPUT -p ALL -s 192.168.51.50 -j BLOCK
-A INPUT -p ALL -f 192.168.51.50 -j DISCARD
iptables
rules will allow all hosts to connect to TCP port 2222?
-A INPUT -p TCP -s 0/0 --destination-port 2222 -j ACCEPT
-A TCP -s ALL -p 2222 -j ACCEPT
-A INPUT -p TCP -s *.* --destination-port 2222 -j ALLOW
-A INPUT --destination-port */* -j ACCEPT
echo "1" > /proc/sys/net/ipv4/nat
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables --enable-forwarding
ip-forward --enable
fail2ban
, which configuration option sets the name and location of the log file to monitor for failures?
logpath
monitor
logfile_mon
monitor_log
ssh-key
ssh-copy-key
ssh-sendkey
ssh-copy-id
/etc
/sudoers
sets the destination address for administrative and security emails related to sudo
?
mail
mailto
secmail
adminmail
-a
option to rsync
is invoked?
-rlpt
-rlptgo
-rpfsxl
-rlptgoD
/etc/ssl
, within which other directory might the files reside?
/etc/sslconfig
/usr/share/ssl
/etc/pki
/etc/private
AllowUsers
PermitUsers
UsersAllowed
AllowedUsers
LOG
target for iptables
sets a string that will be prepended to log entries?
--log-prefix
--prepend
--log-prepend
--log-str
SEPOLICY
SELINUXTYPE
SETARGET
SELINUXPOLICY
getenforce
returns Permissive
?
Permissive
return means SELinux is enabled, but rules are not enforced, although DAC rules are still in effect.Permissive
return means SELinux is not enabled.Permissive
return means SELinux is enabled, although rules are not enforced and DAC rules are not in effect.Permissive
return means SELinux is using an enforcing policy.ssh.conf
and sshd.conf
(typically found in /etc/sshd/
or /etc/ssh
)?
sshd.conf
is the configuration file for the system SSH, and ssh.conf
is the options configuration file.sshd.conf
is the configuration file for the system SSH daemon, and ssh.conf
provides system-wide client SSH configuration.sshd.conf
is used when SSH will be disabled, and ssh.conf
is used when SSH is enabled.sshd.conf
is the first configuration file read for a client connection, while ssh.conf
is the first configuration read for a server configuration.required
has failed. Which of the following describes what happens to the other modules in that realm?
/etc/ctrlaltdel
/etc/shutdown
/etc/keymap
/etc/inittab
firewalld
?
/etc/firewalld/
/usr/lib/firewalld/zones/
/usr/firewalld/zones/
/etc/firewall/zones
/boot/grub/grub.conf
?
login
prompt
boot-passwd
password
sestatus
command indicates that SELinux is in Permissive
mode, which of the following commands is used to change the mode to Enforcing
?
setenforce en
setenforce 1
setenforce on
setenforce --enable
ssh-agent
for authentication assistance with SSH. Which command can be used to add a private key to ssh-agent
?
ssh-privkey
ssh-agent-key
ssh-add
ssh-addkey
getfacl
getacl
acldisp
showacl
echo > /etc/securetty
echo "NoRootCon" > /etc/securetty
rm /etc/securetty
echo "RootCon=no" > /etc/securetty
~/.ssh/hosts
~/.ssh/known_hosts
~/.ssh/config
~/.ssh/hostconfig
chmod
in order to change several web-related files so that the web server/public can read them. Which option should you add to the chmod
command in order for the permissions to inherit to other files?
-R
-v
-i
-M
guidinfo
guid -info
gdisk
blkguid
setsebool
writes the current values to disk so that they will be applied at next reboot?
-A
-P
-D
-M
/etc/apparmor/
/etc/apparmor.d/
/etc/appa.d/
/etc/armor.d/
badlogin
lastb
lastf
flogins
ktix
ktel
kinit
klist
ps aux | grep <agent>
uptime
sysreport <agent>
psrep
ls
command displays ownership and permission information?
-m
-l
-b
-f
getsebool
returns the entire list of SELinux booleans?
-a
-b
-c
-d
netstat
to determine the network-related processes that do not have AppArmor profiles?
aa-profiles
aa-netstat
aa-unconfined
aa-netlist
su
command?
super
admins
wheel
runsu
setcontext
sesecon
chcon
setcon
finger
fprint
bio
freader
restorecon
utility can be used to view the current contexts without making changes?
-n
-r
-g
-p
sudo
to execute the command?
vim
nano
sudoedit
visudo
showcon
proccon
lcon -Z
ps -Z
pam_lock
pam_tally2
pam_loginlock
pam_watchlog
/dev/ttyS0
/dev/ttyP0
/dev/pty
/dev/tys
aa-complain /etc/apparmor.d/*
aa-enable -complain /etc/apparmor.d/*
aa-enable -complain /etc/apparmor/*
aa-complain /etc/apparmor/*
/var/log/sec.log
/var/log/messages
/var/log/kern.log
/var/log/secure
sshd_config
file controls whether the root user can log in directly with SSH?
PermitRoot
PermitRootLogin
RootDirectLogin
AllowRootLogin
firewall-cmd
command sets the current runtime configuration to be available on next reboot of the computer?
--set-perm
--make-perm
--runtime-to-permanent
--current-to-persistent
https://cve.mitre.org
https://www.example.com
ufw
, you need to allow SSH traffic. Which of the following commands facilitates this scenario?
ufw allow tcp/22
ufw enable ssh
ufw allow ssh
ufw enable tcp/21-22
end
alogd
auditd
mond
iptables
ipt
netfw
netfilterfw
tar
command does not seem to work for these files. Which of the following may be able to extract from this backup?
gzip
bzip2
cpio
hpb
scp
, which port needs to be open in the firewall?
ls
command but do not see files that begin with a single dot (.
). Which option to ls
shows those files?
-a
-b
-c
-d
dd
to make an image of the partition to preserve it.tar
.fdisk
.mkfs
to reformat the partition.
-m
-i
-k
-a
sha1sum
mdsum
shasum
shacheck
zip
command causes the command to traverse directories?
-g
-m
-r
-a
ps auwx | grep apache
ls -a
free | grep httpd
monapache
www-data
. What command will change the ownership of a file, given as <filename>
, such that www-data
can write to the file?
chown www-data <filename>
chown apache-www-data <filename>
chmod www-data +w <filename>
chmod www-data.apache <filename>
sudo
in a scripted environment, which option can be used to specify a non-interactive mode?
-f
-m
-n
-l
aa-disable
aa-turnoff
aa-enable -d
aa-off
ls -context
file -Z
ls -Z
sel -context
gds
gpg
dmc
gds2
/etc/apparmor.d/configs
/etc/apparmor/globals
/etc/apparmor/edits
/etc/apparmor.d/tunables
UFW
?
/etc/ufwd
/etc/ufw.d
/etc/ufw
/etc/ufirewall
iptables
in order to more effectively block traffic from entire network ranges?
ipblock
ipset
iplist
ipcoll
rsyslog
for logging, within which file can you look to determine what items are logged on the system?
/etc/rsyslogd.conf
/etc/rsys.conf
/etc/rsyslog.conf
/etc/rsys.cfg
sestatus
shows the context of a file?
-f
-v
-m
-a
chage
sets the maximum days that a password is valid?
-v
-m
-M
-d
UseKerberos
KerberosAuthentication
EnableKerberos
KerberosEnable
iptables-save
to examine the contents of tables in a scripted environment. Which option to iptables-save
can be used to specify the table name rather than outputting information for all tables?
-t
-a
-s
-i
logrotate
?
/etc/logrotate
/etc/logs
/etc/logrotate.d
/var/spool/logrotate
journalctl
command will continuously update the display as new log entries are created?
-tail
-t
-f
-l
pam_enforce.so
pam_limittest.so
pam_max.so
pam_limits.so
loglevel
set to 0x10 in a slapd.conf
configuration file?
pam_fileauth.so
pam_listfiles.so
pam_filesauth.so
pam_fileauth.so
ssh-keygen
sets the type of key that will be created?
-k
-t
-e
-i