What are the first two bytes of a MD5 hash called?
What are the first two bytes of a MD5 hash called?
Which one of the following services can be run as a non-root user?
To increase system security, it is often desirable to run daemons for system services with nonroot user ids. Which one of the following services can be run as a non-root user?
Which statements are true regarding the following syslog.conf configuration directive?
Which statements are true regarding the following syslog.conf configuration directive?
*.err;kern.notice;auth.notice /dev/console
(Select THREE correct answers)
You should:
You want a secure and fast DNS server that must also be quickly accessible remotely. You should:
What does the following command accomplish:$ export PATH=$PATH:
What does the following command accomplish:
$ export PATH=$PATH:$APPLICATIONS
Which THREE statements about crontab are true?
Which THREE statements about crontab are true?
which of following switches should be used:
In order to bypass print filters using lpr, which of following switches should be used:
Complete the following line in /etc/inittabca:12345:________:
You need to prohibit users to use Ctrl+Alt+Del to reboot the system. Complete the following line in /etc/inittab
ca:12345:________:/bin/echo "Reboot not allowed"
which argument to the -name flag will match files or directories beginning with a ‘.’ (period) ?
With the find command, which argument to the -name flag will match files or directories beginning with a ‘.’ (period) ?
In the config file for xinetd, you can specify the interface to offer service by the attribute:
In the config file for xinetd, you can specify the interface to offer service by the attribute: