What does the command mount -a do?
What does the command mount -a do?
Which of the following commands set the sticky bit for the directory /tmp?
Which of the following commands set the sticky bit for the directory /tmp? (Choose TWO
correct answers.)
Which of the following commands can be used to display the inode number of a given file?
Which of the following commands can be used to display the inode number of a given file?
Which of the following commands shows the definition of a given shell command?
Which of the following commands shows the definition of a given shell command?
What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?
What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a
command?
Which of the following pieces of information of an existing file is changed when a hard link pointing to that
Which of the following pieces of information of an existing file is changed when a hard link
pointing to that file is created?
Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on
the internal interface of the firewall to be translated to one public IP address on the external interface of
the same firewall. Which of the following should Sara configure?
Which of the following devices is MOST likely being used when processing the following?
Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY
Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scanThe external party is reporting attacks coming from abc-company.com. Which of the following is the
reason the ABC company’s security administrator is unable to determine the origin of the attack?
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect
Which of the following security devices can be replicated on a Linux based computer using IP tables to
inspect and properly handle network based traffic?
