Last Update 18 hours ago Total Questions : 51
The Linux Security content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include 212-77 practice exam questions in your study plan goes far beyond basic test preparation.
You'll find that our 212-77 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-77 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Linux Security practice test comfortably within the allotted time.
One of your users says that she changed her umask to 664, but now her new files all have a permission block of ---x--x-w-. If she wanted her new files to have a permission block of -rw-rw-r--, what should she have used as a umask?
Which of the following practices is the most useful physical security requirement for
a Linux server?
Which of the following types of information is returned by typing ifconfig eth0?
(Choose two)
When you downloaded a kernel patch from the Internet, the name you clicked on was kernel-patch-2.4.4-66.i386.tar.gz. The file that was downloaded is kernel-patch-2.4.4-66.i386.tgz. Which of the following commands will unarchive this patch from the /tmp directory?
Which of the following are risks of SUID and SGID programs? (Choose two)
You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a
and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?
When you look through the /var/log directory you see a new file, httpd.crit. Assume that it is a legitimate file, created for legitimate reasons. Which of the following statements is the best possible description of this file?
