Term
|
Definition
An attack most often used on packet-filter firewalls, which are configured to allow only known addresses to initiate connectons; attackers forge their source IP address and cause damage just by sending packets randomly. |
|
|
Term
|
Definition
In these attacks, potential intruders use every possible combination of characters to guess passwords or encryption keys until the correct one is found. |
|
|
Term
|
Definition
A condition in which data that has exceeded a buffer's storage capacity overflows into another buffer |
|
|
Term
|
Definition
An executable script used to generate a dynamic Web page's contents |
|
|
Term
denial-of-service (DoS) attacks |
|
Definition
Attacks that overload a server with an overwhelming amount of network traffic so that it can't handle legitimate requests for network services |
|
|
Term
distributed denial-of-service (DDoS) attack |
|
Definition
An attack in which a large number of traffic sources are used to generate bogus traffic to a single system |
|
|
Term
|
Definition
A program that captures and views packets as they're transmitted over a network |
|
|
Term
Pluggable Authentication Module (PAM) |
|
Definition
A system tha provides a centralized mechanism for authenticating all services |
|
|
Term
|
Definition
A specalized form of address spoofing in which a hijacker assumes unauthorized control of a network session |
|
|
Term
|
Definition
A widely used tool for logging connections and controlling access to network services |
|
|
Term
|
Definition
Hidden scripts embedded in authorized programs |
|
|
Term
Which Linux command is used to set a quota for each user on the system? |
|
Definition
|
|
Term
Which Linux commnad is used to enable disk quotas? |
|
Definition
|
|
Term
You have just modified the /etc/fstab file to add the usrquota option and need to create a quota file for users. What Linus command do you use to scan the quota-enabled file system so that it builds a table of current disk use? |
|
Definition
|
|
Term
Which Linux command is used to display a summary of hard disk use as well as quotas for a specified fiel system? |
|
Definition
|
|
Term
If you're using KDE and need temporary root privileges while using a GUI application, which command do you use? |
|
Definition
|
|
Term
Which Linux command do you use to change your user credentials to those of the root user? |
|
Definition
|
|
Term
You're Linux administrator and need to allow a group of users to run certain commands as a root user? What command do you use? |
|
Definition
|
|
Term
Which command do you use to start an X Window session from a terminal window? |
|
Definition
|
|
Term
If you have an X Window session open and need to adjust video settings, which command do you use?
|
|
Definition
|
|
Term
If you have an X Widnow session open and need to view display information , which command do you use |
|
Definition
|
|
Term
Which runlevel, also known as halt, shuts down a Linux machine? |
|
Definition
|
|
Term
Which runlevel, also known a single-user mode, is comparable with safe mode in Windows? |
|
Definition
|
|
Term
Which runlevel, also known as X11, gives you access to all services, incluing GUI? |
|
Definition
|
|
Term
Which of the following is a widely used version of X Window? |
|
Definition
|
|
Term
Which of the following statements about quotas is true? |
|
Definition
By default, a user can exceed a soft limit by seven days and Administrators can use quotas to limit disk space as well as the number of files a user can own |
|
|
Term
Which of the following can respond to network client requests? |
|
Definition
NIS master server and NIS slave server |
|
|
Term
NIS uses which of the following technologies for communication? |
|
Definition
|
|
Term
Which of the following commands returns the NIS server's hostname? |
|
Definition
|
|
Term
An NIS map consists of which files? |
|
Definition
|
|
Term
Which of the following directories does NIS export data to? |
|
Definition
|
|
Term
Which of the following configuration files specifies an NIS client's access rights to the NIS server? |
|
Definition
|
|
Term
The YaST NIS Server module must be downloaded from the openSuSe Web site. True Or False |
|
Definition
|
|
Term
Which of the following terms is used for a physical pritner? |
|
Definition
|
|
Term
Which of the following terms defines software used to manage the physical printer? |
|
Definition
|
|
Term
Which of the following is a directory file where the printer daemon can store print jobs? |
|
Definition
|
|
Term
The subdirectory named after the NIS domain contains which of the following? |
|
Definition
|
|
Term
Which of the following is the default policy for modifying the NIS configuration? |
|
Definition
Using the netconfig script |
|
|
Term
Which of the following information is provided by DHCP server? |
|
Definition
Network subnet/host address
Subnet/hostname
Subnet/hardware address |
|
|
Term
Samba uses which of the following to authenticate users? |
|
Definition
|
|
Term
Which of the following is the Samba configuration file? |
|
Definition
|
|
Term
Which of the following commands do you use to connect to a Windows share in an interactive mode? The Windows server is mainoffice, and share name is documents. Make sure you aren't promted for a password. |
|
Definition
smbclient //mainoffice/documents -N |
|
|
Term
Which of the following commands is used to create and modify users in Samba? |
|
Definition
|
|
Term
What is the URL if you're accessing SWAT on the Samba server? |
|
Definition
|
|
Term
Which of the following daemons controls SWAT? |
|
Definition
|
|
Term
Parameters in the Samba configuration file are grouped in which of the following categories? |
|
Definition
Global settings and Share definitions |
|
|
Term
A domain controller handels which of the following in a Windows domain? |
|
Definition
|
|