DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

ECCouncil 212-77 Exam Questions and Answers, Linux Security Exam | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Which of the following are ways to disable dynamic routing?
A. The linuxconf Gated Daemon screen
B. The linuxconf Routed Daemon screen
C. echo "0" > /proc/sys/net/ipv4/dynamic_routing
D. Editing /etc/sysconfig/network-scripts
View answer
Correct Answer: B
Question #2
Under the bash shell which is the most appropriate place to set environment variables that apply to all users?
A. /etc/skel
B. rc
C. /etc/profile
D. /etc/bashrc
E. rc
View answer
Correct Answer: A
Question #3
Which of the following are risks of SUID and SGID programs? (Choose two)
A. Bugs in the programs may cause more damage than they would in ordinary programs
B. The program files are large and thus may cause a disk to run out of space
C. Because the programs require password entry, running them over an insecure network link runs the risk of password interception
D. Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible
View answer
Correct Answer: BD
Question #4
Which of the following statements applies to the IP address 192.168.0.1?
A. It is reserved
B. It cannot be assigned to a host that accesses the Internet
C. It is designated for multicast transmission
D. It can be freely assigned to a host on a private network
View answer
Correct Answer: A
Question #5
Which of the following is true of Linux passwords?
A. They are changed with the password utility
B. They must be changed once a month
C. They may consist only of lowercase letters and numbers
D. They may be changed by the user who owns an account or by root
View answer
Correct Answer: A
Question #6
Which of the following measures is the most effective way to prevent attacks through various network services?
A. Disable a service in the appropriate /etc/xinetd
B. Use a firewall to drop all requests to unneeded services
C. Block service requests with the appropriate commands in /etc/hosts
D. Uninstall unneeded network services
View answer
Correct Answer: D
Question #7
Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?
A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd
View answer
Correct Answer: B
Question #8
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
A. Fast processor to help with network traffic analysis
B. They must be dual-homed
C. Similar RAM requirements
D. Fast network interface cards
View answer
Correct Answer: B
Question #9
You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information?
A. man syslog 3
B. man 3 syslog
C. man syslog -3
D. man -3 syslog
View answer
Correct Answer: B
Question #10
Which of the following is not a Linux DHCP client?
A. dhcpcd
B. pump
C. dhcpd
D. dhclient
View answer
Correct Answer: A
Question #11
How should you engage users in helping to secure your computer's passwords?
A. Educate them about the importance of security, the means of choosing good passwords, and the ways crackers can obtain passwords
B. Instruct your users to e-mail copies of their passwords to themselves on other systems so that they're readily available in case of an emergency
C. Enforce password change rules but don't tell users how crackers obtain passwords since you could be educating a future cracker
D. Give some of your users copies of the encrypted database file as backup in case a cracker breaks in and corrupts the original
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: