March Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ECCouncil 212-77 Linux Security Exam Practice Test

Page: 1 / 5
Total 51 questions

Linux Security Questions and Answers

Question 1

Why is a log file analysis tool like Logcheck useful?

Options:

A.

Logcheck compares patterns of activity across several days or weeks and spots anomalies.

B.

Logcheck uses information in log files to help identify a cracker.

C.

Logcheck translates log file entries from cryptic comments into plain English.

D.

Logcheck sifts through large log files and alerts you to the most suspicious entries.

Question 2

When you look through the /var/log directory you see a new file, httpd.crit. Assume that it is a legitimate file, created for legitimate reasons. Which of the following statements is the best possible description of this file?

Options:

A.

It contains error messages related to access to your Apache Web server.

B.

It includes critical notices related to access through your router.

C.

It contains critical information related to your Web access.

D.

It includes critical messages about the actions taken by your Apache Web server.

Question 3

You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information?

Options:

A.

man syslog 3

B.

man 3 syslog

C.

man syslog -3

D.

man -3 syslog

Question 4

On Linux systems, how can root logins be restricted?

Options:

A.

With the /etc/default/login file

B.

With the /etc/default/useradd file

C.

With the .profile file

D.

With the /etc/securetty file

Question 5

A user is logged into the Linux workstation, what is the best way to login to root from a shell prompt?

Options:

A.

chuser root

B.

root

C.

login root

D.

su

Question 6

Which of the following is an advantage of designating one well-protected computer to record log files for several other computers?

Options:

A.

You can log information to a separate computer that you can't log locally.

B.

Logging information in this way minimizes network use.

C.

The logging system can analyze the logs using Tripwire.

D.

Logs stored on a separate computer are less likely to be compromised by a cracker.

Question 7

What does the command "ps" do?

Options:

A.

Prints the directory

B.

Print status of LPT1

C.

Shows what processes are running

D.

Produces system statistics

Page: 1 / 5
Total 51 questions