Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When you look through the /var/log directory you see a new file, httpd.crit. Assume that it is a legitimate file, created for legitimate reasons. Which of the following statements is the best possible description of this file?

A.

It contains error messages related to access to your Apache Web server.

B.

It includes critical notices related to access through your router.

C.

It contains critical information related to your Web access.

D.

It includes critical messages about the actions taken by your Apache Web server.

Full Access
Question # 5

You're planning the setup of a Linux computer as a server on your organization's network. Which of the following is consistent with best practices for documentation?

A.

Keep a copy of each user's password in a locked filing cabinet in the same room as the Linux server.

B.

Record the inode number of every file in a binder in the same room as the Linux server.

C.

Record the hardware configuration details in a binder in the same room as the Linux server.

D.

Keep a copy of key configuration files on a different partition on the same computer.

Full Access
Question # 6

Which of the following practices is the most useful physical security requirement for

a Linux server?

A.

Keep the Linux server in a locked room.

B.

Never leave the Linux computer unattended while it is running.

C.

Maintain a password-protected screensaver on the Linux server.

D.

Keep passwords stored in a locked file cabinet.

Full Access
Question # 7

Which of the following commands gives you the current routing table without requiring network activity to access a DNS server?

A.

netstat -r

B.

netstat

C.

route

D.

route -n

Full Access