Which of the following is most likely to be the source …
You have just recompiled a new kernel and rebooted your system with the new kernel.
Unfortunately you are getting “Can’t locate module” error messages. Which of the following is most likely to be the source of the problem?
Which of the following could be used to load kernel mod…
Which of the following could be used to load kernel modules for a 2.4.x kernel?
which of the following commands can be used to create t…
When preparing to compile a new kernel, which of the following commands can be used to create the configuration file?
How many cron fields are there for specifying the time …
How many cron fields are there for specifying the time to execute a cron job?
What is a well-known service that binds port 25 and is …
What is a well-known service that binds port 25 and is it required on all hosts?
the ______ command can provide that information if the kernel is built to support it
CORRECT TEXT
If you need to view per-user disk space usage on a filesystem, the ______ command can provide that information if the kernel is built to support it.
What action, if any, should you take?
You’ve been reviewing your security checklist and one of the items calls for reviewing the
/etc/passwd file. You cat the file and notice that, while most users have an x in the second column, a few have a 14 character string in the second column. What
action, if any, should you take?
What is the best utility to use to do this?
You want to change the aging information in the /etc/shadow file. What is the best utility to use to do this?
Which one of the following services can be run as a non…
To increase system security, it is often desirable to run daemons for system services with nonroot user ids. Which one of the following services can be run as a
non-root user?
Which of the following is most likely causing this problem?
You’ve just rebooted your server. Users complain that the server is refusing secure connections.
Which of the following is most likely causing this problem?