Question: 1
You are configuring the security of a service using Xinetd. You wish to add a line to the configuration of the service that grants access during the hours of 6AM to 7PM. Which of the following lines will you need to add to the configuration to achieve this result?
Question: 2
As an administrator you wish to keep a tight control over the passwords used in your network. You are looking for new tools to work with on Linux.. You bring up a search engine and type 'passwords AND Linux'. Many of the search hits point to a tool called 'John the Ripper'. You download it and find out that it is a:
Question: 3
While creating the backup strategy for your organization, you examine the three primary types of backups. What are those three types?
Question: 4
You come into work and find that the network has been infected with a new Trojan horse program and by default it has opened all ports as listening. You do some quick Internet searches, and find there is a site that hosts a security program that is said to be able to rid a computer of the new Trojan. Although you have never been to this site before, this is exactly the tool you need for your network. However, you are a careful administrator. You view any free tool with skepticism. In this case, what three concerns should you consider when downloading this new security program?
Question: 5
You are configuring the permissions to a file, called file1, on your Linux file server. You wish to change the permissions to allow all users to have read access to this file. Which of the following commands will complete this task?