Linux (XK0-004) Domain 3 Learn Mode
Quiz Summary
0 of 19 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 19 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score | |
Your score |
Categories
- Not categorized 0%
- Not categorized 0%
- Linux Domain 3 0%
Remember, all the questions have explanations explaining why the correct answers are correct and why the incorrect answers are incorrect.
Understanding the explanations will help ensure you’re prepared for the live exam. The explanation also shows the course or courses where you can get more detailed information on the topic.
Click “View Questions” to see the explanations.
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- Current
- Review / Skip
- Answered
- Correct
- Incorrect
- Question 1 of 19
1. Question
Lisa, a Linux server administrator, is tasked with ensuring that SSH uses only specific algorithms. Which of the following files should she edit?
CorrectIncorrect - Question 2 of 19
2. Question
You manage a server running SELinux. Apu has reported that he can’t open some files on the server. Which of the following commands can you use to list and check the security context of the files?
CorrectIncorrect - Question 3 of 19
3. Question
Lisa is tasked with creating a compressed archive of all the files stored in the /var/mail directory. Her system has both the tar and bzip2 packages installed. Which of the following commands should she use?
CorrectIncorrect - Question 4 of 19
4. Question
You need to securely copy all the files from a folder on production server to a similar folder on a testing server. Which of the following commands would you use?
CorrectIncorrect - Question 5 of 19
5. Question
Seymour added a second NIC to a Linux system and configured it to act as a router within the school network. However, testing showed that IP packets are not being routed between the NICs. What should he check?
CorrectIncorrect - Question 6 of 19
6. Question
You have added a second NIC to a Linux server and configured it as router. However, testing shows it is not routing packets as expected. Which of the following commands is the BEST choice to resolve this problem?
CorrectIncorrect - Question 7 of 19
7. Question
You have configured a Linux server in your DMZ with a static IP address of 10.80.1.10? You created an iptables rule to always accept SSH connections from your computer. You now want to create an iptables rule to block all SSH connections from any other IP address. Users that try to connect will see an error indicating the connection was refused. Which of the following rules is the BEST choice to achieve this?
CorrectIncorrect - Question 8 of 19
8. Question
You have configured a Linux server in your DMZ with a static IP address of 10.80.1.10? You created an iptables rule to always accept SSH connections from your computer. You now want to create an iptables rule to block all SSH connections from any other IP address. Users that try to connect will not see an error indicating the connection was refused. Which of the following rules is the BEST choice to achieve this?
CorrectIncorrect - Question 9 of 19
9. Question
Lisa administers a Linux server in the DMZ. She suspects hackers have been trying a brute force attack to guess the passwords. Which of the following would be the EASIEST to use to identify all unsuccessful login attempts?
CorrectIncorrect - Question 10 of 19
10. Question
Lisa is doing some administrative work on a Linux computer and realizes she needs administrative privileges. Which of the following commands would she use to elevate her privileges?
CorrectIncorrect - Question 11 of 19
11. Question
Maggie is an administrator of a secure server and she is in the DBAdmins group. The DBAdmins group has the following permissions on a file named AppLog.
– rwx rw- r–
However, Maggie is unable to make changes to this file. Of the following, what is the MOST likely reason why Maggie cannot make changes to this file?CorrectIncorrect - Question 12 of 19
12. Question
Homer is trying to connect to a remote Linux server. Unfortunately, the server is rejecting the connection. He suspects that his SSH client is not using the correct encryption algorithms. Which of the following files should he edit?
CorrectIncorrect - Question 13 of 19
13. Question
You are navigating through a Linux computer using the terminal. Which of the following commands will you use to display the contents of a directory?
CorrectIncorrect - Question 14 of 19
14. Question
You are tasked with configuring a Linux system to display a message to all users have they log on. Which of the following is the BEST solution?
CorrectIncorrect - Question 15 of 19
15. Question
A network administrator is configuring a Linux computer that will be used for network security. He plans to use it to inspect and handle network-based traffic using iptables. Which of the following network devices will server most likely mimic?
CorrectIncorrect - Question 16 of 19
16. Question
Lisa entered the following command at the Linux terminal:
cat /proc/meminfo
What information will this command show to her?
CorrectIncorrect - Question 17 of 19
17. Question
You have enabled FTP on a Linux server so that mobile sales personnel can periodically download files. You want to provide a layer of protection to thwart potential attacks. Which of the following would support this goal?
CorrectIncorrect - Question 18 of 19
18. Question
You need to create an archive of a Linux system disk as a backup. Which of the following will meet this goal?
CorrectIncorrect - Question 19 of 19
19. Question
You want to configure a Linux server to collect log entries from other servers and network devices. What would you use to configure the rules for processing these log messages?
CorrectIncorrect