which of the following commands would gather the data requested by the client?
You find that a host (192.168.1.4) being used on one of your client’s networks has been
compromised with a backdoor program listening on port 31337. Your client requests a list of
originating IP addresses connecting to that port. Using a Linux workstation as traffic analyzer, which
of the following commands would gather the data requested by the client?
Which tool can be used to control the runtime behavior of udev?
Which tool can be used to control the runtime behavior of udev?
What is the purpose of udevmonitor?
What is the purpose of udevmonitor?
What is the term for unmounting a filesystem, which cleans up all references to the filesystem, as soon as it
What is the term for unmounting a filesystem, which cleans up all references to the filesystem, as
soon as it is not in use any longer?
Which system files are updated as devices are mounted and unmount to provide information on the mounted device
Which system files are updated as devices are mounted and unmount to provide information on the
mounted devices and the options used? (Please specify TWO answers)
which command can be used to stop the apache2 init script from running at boot time once the real script has b
On a Debian based system, which command can be used to stop the apache2 init script from running
at boot time once the real script has been removed from /etc/init.d/?
Which command could be used to see the kernel messages created from the boot time until now?
Which command could be used to see the kernel messages created from the boot time until now?
Which of the following commands will tell named to reload its zone files?
A zone file on the DNS server has been updated. Which of the following commands will tell named to
reload its zone files? (Please select TWO correct answers)
Which hdparm command-line options will set an IDE hard disk to use both DMA and 32-bit I/O support?
Which hdparm command-line options will set an IDE hard disk to use both DMA and 32-bit I/O
support?
Which of the following applications utilize the device mapper?
Which of the following applications utilize the device mapper? (Select TWO correct answers)