Pass the ECCouncil E-Commerce Architect 212-77 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?

Options:

A.

vi /etc/shadow


B.

sudo -c "vi /etc/shadow"


C.

su -c "vi /etc/shadow"


D.

visu vi /etc/passwd


Expert Solution
Questions # 2:

Which of the following types of information is returned by typing ifconfig eth0?

(Choose two)

Options:

A.

The names of programs that are using eth0


B.

The IP address assigned to eth0


C.

The hardware address of eth0


D.

The hostname associated with eth0


Expert Solution
Questions # 3:

Which of the following statements applies to the IP address 192.168.0.1?

Options:

A.

It is reserved.


B.

It cannot be assigned to a host that accesses the Internet.


C.

It is designated for multicast transmission.


D.

It can be freely assigned to a host on a private network


Expert Solution
Questions # 4:

You're using a communications protocol that cannot handle encrypted passwords.

You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?

Options:

A.

grpunconv; passunconv


B.

grpunconv; pwunconv


C.

gconv; passunconv


D.

gconv; pwunconv


Expert Solution
Questions # 5:

Which of the following is not a Linux DHCP client?

Options:

A.

dhcpcd


B.

pump


C.

dhcpd


D.

dhclient


Expert Solution
Questions # 6:

Which of the following configuration options for kernel enable you to effectively make your computer a router?

Options:

A.

CONFIG_FIREWALL


B.

CONFIG_IP_FIREWALL


C.

CONFIG_SYN_COOKIES


D.

CONFIG_IP_FORWARD


Expert Solution
Questions # 7:

Why is a log file analysis tool like Logcheck useful?

Options:

A.

Logcheck compares patterns of activity across several days or weeks and spots anomalies.


B.

Logcheck uses information in log files to help identify a cracker.


C.

Logcheck translates log file entries from cryptic comments into plain English.


D.

Logcheck sifts through large log files and alerts you to the most suspicious entries.


Expert Solution
Questions # 8:

Which of the following commands configures the laura account to expire on

January 1, 2005?

Options:

A.

chage -E 2005/01/01 laura


B.

usermod -e 2005 laura


C.

usermod -e 2005-01-01 laura


D.

chage -I 2005-01-01 laura


Expert Solution
Questions # 9:

Which of the following are ways to disable dynamic routing?

Options:

A.

The linuxconf Gated Daemon screen


B.

The linuxconf Routed Daemon screen


C.

echo "0" > /proc/sys/net/ipv4/dynamic_routing


D.

Editing /etc/sysconfig/network-scripts


Expert Solution
Questions # 10:

You inadvertently change the permission block on /usr/bin/passwd command to

-r-xr-xr-x.

What would be the effect of this change?

Options:

A.

No changes in how the command runs would occur.


B.

Users could no longer change their passwords because they do not have write permissions to /etc/passwd.


C.

Users' passwords would not expire.


D.

Shadow passwords would quit working.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions