Ensurepass

QUESTION 381

You have a file /etc/resolv.conf, but the computer does not use the configured DNS servers to look up host names. What is most likely the problem?

A. The hosts entry in your /etc/nsswitch.conf does not list dns.

B. You do not have a /etc/named.conf file.

C. The localhost hostname is not properly configured in /etc/hosts.

D. The named daemon is not running on your computer.

Answer: A


QUESTION
382

What configuration file contains the list of directories shared via NFS?

A. /etc/share

B. /etc/exports

C. /etc/dfs/dfstab

D. /etc/fstab

Answer: B


QUESTION
383 CORRECT TEXT

What kind of DNS entries are used to get the hostname of a given IP address?

Please enter exactly one word.

Answer: reverse


QUESTION
384

What command do you use to generate an OpenSSH host key?

A. sshd

B. ssh-agent

C. ssh-keygen

D. ssh-add

Answer: C


QUESTION
385 CORRECT TEXT

The _______ command is used to modify a user’s account information.

Answer: usermod


QUESTION
386

Your FTP server has been under attack, and the ISP of the attacker has been less than helpful in mitigating the attacks. So you decide that all connections from that ISP (badguy.example.org) to your FTP server will be denied and sent a message. Which line in your /etc/hosts.allow will have the desired effect?

A. in.ftpd : .badguy.example.org : twist 450 denied due to numerous attacks from this domain

B. ftp : badguy.example.org : DENIED message 450 denied due to numerous attacks from this domain

C. in.ftpd : badguy.example.org : spawn echo 450 denied due to numerous attacks from this domain

D. ftp : .badguy.example.org : DENIED due to numerous attacks from this domain

Answer: A


QUESTION
387 CORRECT TEXT

You want to temporarily prevent users from logging in. Please complete the following command:

touch /etc/________

Answer: nologin


QUESTION
388

Which of the following services is NOT usually protected via TCP wrappers?

A. ftp

B. finger

C. auth

D. http

Answer: D


QUESTION
389

Your gateway to the internet is using iptables and N

A. to allow your private network to access the Internet. You’ve verified that the gateway is not set up to block packets, but you need to verify that it is properly masquerading them. Which of the following commands would you use to look at your NAT tables?

A. iptables -L -n

B. iptables -t nat -L

C. iptables -t mangle -L

D. iptables -t filter -L

Answer: B


QUESTION
390 CORRECT TEXT

For security reasons, the system administrator is setting up a log server. What file does the system administrator have to edit in order to have each machine send log entries to the new log server?

Answer: /etc/syslog.conf

Download Latest LPI 117-102 DUMPS Real Free Tests , help you to pass exam 100%.

Comments are closed.