Which of the following lines in the sshd configuration file should, if present, be changed in order to increas
Which of the following lines in the sshd configuration file should, if present, be changed in order to
increase the security of the server? (Choose TWO correct answers.)
What file allow admin to adjust number of mounts after which file system will be checked by e2fsck?
CORRECT TEXT
What file allow admin to adjust number of mounts after which file system will be checked by e2fsck?
what configuration keyword must be set to yes in the sshd configuration file?
To allow X connections to be forwarded from or through an SSH server, what configuration
keyword must be set to yes in the sshd configuration file?
Which command will convert all tab characters in a file to spaces and print that to standard out?
Which command will convert all tab characters in a file to spaces and print that to standard out?
(Specify ONLY the command without any path or parameters.)
CORRECT TEXT
Specify the command to create a SSH key-pair. (Specify ONLY the command without any path or
parameters.)
Which of the following is a limitation of the cut command?
Which of the following is a limitation of the cut command?
What parameter in the sshd configuration file instructs sshd to permit only specific user names to log in to a
CORRECT TEXT
What parameter in the sshd configuration file instructs sshd to permit only specific user names to
log in to a system? (Please specify the parameter only without settings)
which command character can be used to begin a reverse search of the text?
When in Normal mode in vi, which command character can be used to begin a reverse search of
the text?
what purpose is TCP/IP stack fingerprinting used by nmap?
For what purpose is TCP/IP stack fingerprinting used by nmap?
In bash, inserting 2>&1 after a command redirects
In bash, inserting 2>&1 after a command redirects