Month End Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Get Certified: Proven Methods to Pass the ECCouncil 212-77 Exam

Questions 1

As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory. Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?

Options:
A.

ln /opt/test/antiterror /opt/bin/antiterror-7/antiterror-7

B.

ln antiterror /opt/bin/antiterror-8/antiterror-8

C.

ln /opt/test/antiterror.lnk /opt/bin/antiterror-8/antiterror-8

D.

ln /opt/test/antiterror /opt/bin/antiterror-8/antiterror-8

ECCouncil 212-77 Premium Access
Questions 2

What is the name of the file that contains encrypted hashes of passwords on a Linux system?

Options:
A.

/etc/shadow

B.

/etc/.passwd

C.

/etc/passwd

D.

/.secure/.htaccess

Questions 3

You've installed a new application on a test computer. During testing, you've run into a number of problems that you are unable to troubleshoot. Where should you look first for help?

Options:
A.

Before doing anything else, install the application on a production computer and see if you still have the same problems.

B.

The log files associated with the application.

C.

The Web site home page for the application.

D.

Newsgroups where other users discuss the application.

Questions 4

You want to know how long each user's session was the last time they logged on.

Which of the following log files contains this information?

Options:
A.

/var/log/utmp

B.

/var/log/usrlog

C.

/var/log/wtmp

D.

/var/log/lastlog

Questions 5

You're planning the setup of a Linux computer as a server on your organization's network. Which of the following is consistent with best practices for documentation?

Options:
A.

Keep a copy of each user's password in a locked filing cabinet in the same room as the Linux server.

B.

Record the inode number of every file in a binder in the same room as the Linux server.

C.

Record the hardware configuration details in a binder in the same room as the Linux server.

D.

Keep a copy of key configuration files on a different partition on the same computer.

Questions 6

Assume you have forgotten the current superuser password for your Linux computer. On several Linux distributions, which of the following commands allows you to reset the root user password?

Options:
A.

Run the shutdown -r now command, wait until your computer reboots, then at the

LILO Boot prompt enter the linux single command. When you see the prompt, run the

passwd command.

B.

Restart your computer. When your computer reboots, wait until you see the LILO

Boot prompt. At that prompt, enter the init 1 command. When you see the command-line interface prompt, run the passwd command.

C.

Restart your computer. When Linux reboots, log in again, then enter the init 1 command. When you see the command-line interface prompt, run the passwd command.

D.

Restart your computer. When your computer reboots, wait until you see the LILO

Boot prompt. At that prompt, enter the linux single command. When you see the command-line interface prompt, run the passwd command.

Questions 7

Which of the following steps would not substantially improve security over the typical Linux installation to a computer with typical hardware and settings?

Options:
A.

Set a BIOS password.

B.

Remove servers that were installed by default but that are not being used.

C.

Set the computer to boot from a CD-ROM before a floppy.

D.

Lock the computer case shut.

Questions 8

How should you engage users in helping to secure your computer's passwords?

Options:
A.

Educate them about the importance of security, the means of choosing good passwords, and the ways crackers can obtain passwords.

B.

Instruct your users to e-mail copies of their passwords to themselves on other systems

so that they're readily available in case of an emergency

C.

Enforce password change rules but don't tell users how crackers obtain passwords since you could be educating a future cracker.

D.

Give some of your users copies of the encrypted database file as backup in case a cracker breaks in and corrupts the original.

Questions 9

Which of the following practices is the most useful physical security requirement for

a Linux server?

Options:
A.

Keep the Linux server in a locked room.

B.

Never leave the Linux computer unattended while it is running.

C.

Maintain a password-protected screensaver on the Linux server.

D.

Keep passwords stored in a locked file cabinet.

Questions 10

Which file contains the name servers to be used by the local machine for hostname resolution?

Options:
A.

/etc/services/

B.

/etc/hosts

C.

/etc/resolv.conf

D.

/etc/network/interfaces