[Free] 2018(Jan) Dumps4cert Examcollection ECCouncil 212-77 Dumps with VCE and PDF 21-30

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan ECCouncil Official New Released 212-77
100% Free Download! 100% Pass Guaranteed!

Linux Security

Question No: 21

You want to know how long each user#39;s session was the last time they logged on.

Which of the following log files contains this information?

  1. /var/log/utmp

  2. /var/log/usrlog

  3. /var/log/wtmp

  4. /var/log/lastlog

Answer: D

Question No: 22

You want to allow Linux users running StarOffice to directly edit files stored on a

Windows 2000 SMB/CIFS file server. Which of the following would you use to enable this?

  1. Linux#39;s standard NFS file sharing support

  2. The Linux smbclient program

  3. An FTP server running on the Windows system

  4. The Linux smbmount program

Answer: B

Question No: 23

Which of the following umask values will result in files with rw-r— permissions?

A. 640

B. 022

C. 210

D. 027

Answer: A

Question No: 24

You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a

and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?

  1. You did not assign a valid password to Mary#39;s account.

  2. You did not set the appropriate permissions to her home directory.

  3. You did not create her home directory.

  4. You cannot create a new user account by manually editing the /etc/passwd file.

Answer: C

Question No: 25

Which of the following types of information is returned by typing ifconfig eth0? (Choose two)

  1. The names of programs that are using eth0

  2. The IP address assigned to eth0

  3. The hardware address of eth0

  4. The hostname associated with eth0

Answer: B,D

Question No: 26

Which of the following commands gives you the current routing table without requiring network activity to access a DNS server?

  1. netstat -r

  2. netstat

  3. route

  4. route -n

Answer: A

Question No: 27

An irreparably corrupt ext2 filesystem requires running

  1. fdisk

  2. mkfs

  3. newfs

  4. fsck

Answer: D

Question No: 28

Which of the following is an advantage of designating one well-protected computer to record log files for several other computers?

  1. You can log information to a separate computer that you can#39;t log locally.

  2. Logging information in this way minimizes network use.

  3. The logging system can analyze the logs using Tripwire.

  4. Logs stored on a separate computer are less likely to be compromised by a cracker.

Answer: C

Question No: 29

Which of the following lines would log all messages from news to the file /var/log/newslog?

  1. news.* /var/log/newslog

  2. news.!* /var/log/newslog

  3. news.*;news.!=info /var/log/newslog

  4. *news /var/log/newslog

Answer: D

Question No: 30

Which of the following configuration options for kernel enable you to effectively make your computer a router?





Answer: A

100% Dumps4cert Free Download!
Download Free Demo:212-77 Demo PDF
100% Dumps4cert Free Guaranteed!
212-77 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No