Which file should you edit?
You want to configure the SSH daemon on a Linux system to require a more secure version of
SSH. Which file should you edit?
Which of the following is an accurate statement about this change in the system?
You need to configure your system so that members of the wheel group can become root without
having to provide a password first. Which of the following is an accurate statement about this
change in the system?
Which of the following systems has operated correctly?
A Linux system has prohibited a user from logging on as root, even though this user knows the
root password on a Linux system. Which of the following systems has operated correctly?
which component can be used to view the activities of a user who has logged in to an account?
In a Windows system, which component can be used to view the activities of a user who has
logged in to an account?
Which directory contains scripts that you can modify to activate and deactivate network services in a Linux sy
Which directory contains scripts that you can modify to activate and deactivate network services in
a Linux system?
Which port allows a user to access it without authentication?
Which port allows a user to access it without authentication?
Which of the following upgrade strategies will reduce downtime?
Two routers require a firmware upgrade. Which of the following upgrade strategies will reduce
downtime?
Which of the following is highly recommended for a system to be used as evidence in a legal procedure?
Which of the following is highly recommended for a system to be used as evidence in a legal
procedure?
Which of the following is an example of properly handling a system after an attack?
Which of the following is an example of properly handling a system after an attack?
Why is it important for a system to remain operating immediately after a break-in?
Why is it important for a system to remain operating immediately after a break-in?