What should the permission settings be for /etc/passwd and /etc/shadow?
What should the permission settings be for /etc/passwd and /etc/shadow?
Which of the following configuration files should be modified to set default shell variables for all users?
Which of the following configuration files should be modified to set default shell variables for all users?
What command prints available functions?
What command prints available functions?
Which line in your /etc/hosts.allow will have the desired effect?
Your FTP server has been under attack, and the ISP of the attacker has been less than helpful in mitigating the attacks. So you decide that all connections from that ISP (badguy.example.org) to your FTP server will be denied and sent a message. Which line in your /etc/hosts.allow will have the desired effect?
The file /etc/ssh_known_hosts typically contains hosts keys for ______.
The file /etc/ssh_known_hosts typically contains hosts keys for ______.
When you run the command newaliases, it will:
When you run the command newaliases, it will:
Which of the following represents a class C netmask?
Which of the following represents a class C netmask?
How do you remove his account and directory?
User Bob Swanson (bswanson) has left Company.com. His data has already been removed from his directory. How do you remove his account and directory?
What single command will accomplish this?
Your machine has two working NICs with proper addresses. You want to split your network into two new subnets. What single command will accomplish this?
What do you do next?
You’ve decided to convert from standard shadow passwords to MD5 passwords. You make the appropriate changes to the /etc/pam.d/ files. What do you do next?