What line in the /etc/pam.d/su file will allow root to use su without supplying passwords?
On a new Linux system, the root user is being asked to provide the root user password before being able to use the su command. What line in the /etc/pam.d/su file will allow root to use su without supplying passwords?
How should the corresponding configuration entry be formated?
An SELinux security context is required to ensure that all files in /opt have the default context of system_u:object_r:usr_t.
How should the corresponding configuration entry be formated?
An administrator is capturing traffic with Wireshark and is only seeing ARP traffic. What is most likely cause
An administrator is capturing traffic with Wireshark and is only seeing ARP traffic. What is most likely cause of this?
what command can be used to compare the configuration file with the latest committed version?
There is a configuration file being managed by RCS. Base on timestamps, it appears that someone has modified the file without checking it into RCS. what command can be used to compare the configuration file with the latest committed version?
(specify the command only, no path or arguments information)
Which command will set the user.author attribute on the file afile.txt
Which command will set the user.author attribute on the file afile.txt
Which GPG command is used to sign a public key?
Which GPG command is used to sign a public key?
(Select 2 correct answers)
Which utility is used for retrieving, setting, and removing NFSv4 ACLs?
Which utility is used for retrieving, setting, and removing NFSv4 ACLs?
(Supply only the command name, with no options or parameters)
What does the following iptables rule accomplish
What does the following iptables rule accomplish:
iptables A INPUT s 208.77.188.166 d 10.142.232.1 p tcp dport 22 j ACCEPT
which keyring is used to search for a public keys?
By default, when verifying a signed file or a file with a detached signature, which keyring is used to search for a public keys?
Which of the following commands will create a new, signed tw.pol file?
Which of the following commands will create a new, signed tw.pol file?