لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following are ways to disable dynamic routing?
A. The linuxconf Gated Daemon screen
B. The linuxconf Routed Daemon screen
C. echo "0" > /proc/sys/net/ipv4/dynamic_routing
D. Editing /etc/sysconfig/network-scripts
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Under the bash shell which is the most appropriate place to set environment variables that apply to all users?
A. /etc/skel
B. rc
C. /etc/profile
D. /etc/bashrc
E. rc
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following are risks of SUID and SGID programs? (Choose two)
A. Bugs in the programs may cause more damage than they would in ordinary programs
B. The program files are large and thus may cause a disk to run out of space
C. Because the programs require password entry, running them over an insecure network link runs the risk of password interception
D. Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible
عرض الإجابة
اجابة صحيحة: BD
السؤال #4
Which of the following statements applies to the IP address 192.168.0.1?
A. It is reserved
B. It cannot be assigned to a host that accesses the Internet
C. It is designated for multicast transmission
D. It can be freely assigned to a host on a private network
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following is true of Linux passwords?
A. They are changed with the password utility
B. They must be changed once a month
C. They may consist only of lowercase letters and numbers
D. They may be changed by the user who owns an account or by root
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following measures is the most effective way to prevent attacks through various network services?
A. Disable a service in the appropriate /etc/xinetd
B. Use a firewall to drop all requests to unneeded services
C. Block service requests with the appropriate commands in /etc/hosts
D. Uninstall unneeded network services
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?
A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
A. Fast processor to help with network traffic analysis
B. They must be dual-homed
C. Similar RAM requirements
D. Fast network interface cards
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information?
A. man syslog 3
B. man 3 syslog
C. man syslog -3
D. man -3 syslog
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which of the following is not a Linux DHCP client?
A. dhcpcd
B. pump
C. dhcpd
D. dhclient
عرض الإجابة
اجابة صحيحة: A
السؤال #11
How should you engage users in helping to secure your computer's passwords?
A. Educate them about the importance of security, the means of choosing good passwords, and the ways crackers can obtain passwords
B. Instruct your users to e-mail copies of their passwords to themselves on other systems so that they're readily available in case of an emergency
C. Enforce password change rules but don't tell users how crackers obtain passwords since you could be educating a future cracker
D. Give some of your users copies of the encrypted database file as backup in case a cracker breaks in and corrupts the original
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: