Quiz-summary
0 of 29 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
Information
Because of some problems with how to create an Test Online, we temporarily use the symbol (\) instead of the symbol (/) in some sentences. So you need to change the symbol (\)to the symbol (/) when you do it in practice. Thank you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 29 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- Answered
- Review
-
Question 1 of 29
1. Question
1 pointsWhich super server has replaced inetd?Correct
Incorrect
-
Question 2 of 29
2. Question
1 pointsWhat is the main feature of a super server?Correct
Incorrect
-
Question 3 of 29
3. Question
1 pointsThe inetd daemon will automatically reload the configuration file if it is modified. True or False?Correct
Incorrect
-
Question 4 of 29
4. Question
1 pointsThe inetd and xinetd daemons can run simultaneously on a system. True or False?Correct
Incorrect
-
Question 5 of 29
5. Question
1 pointsWhat method is used to apply TCP Wrappers to a network service?Correct
Incorrect
-
Question 6 of 29
6. Question
1 pointsYou are using a server with two NICs, eth0 and eth1. You want to configure TCP Wrappers for using the telnet service on eth1 only in the hosts.allow file, this can be done by specifying ____:Correct
Incorrect
-
Question 7 of 29
7. Question
1 pointsWhich command is used to verify if a program is compiled with TCP Wrappers?Correct
Incorrect
-
Question 8 of 29
8. Question
1 pointsHow is the default run level defined?Correct
Incorrect
-
Question 9 of 29
9. Question
1 pointsWhat does the \etc\init.d directory contain?Correct
Incorrect
-
Question 10 of 29
10. Question
1 pointsWhich of the following is not a valid option for the scripts in the \etc\init.d directory?Correct
Incorrect
-
Question 11 of 29
11. Question
1 pointsWhich file is used to verify the services specified in the inetd configuration?Correct
Incorrect
-
Question 12 of 29
12. Question
1 pointsWhich of the following is not a criteria for defining access control using xinetd?Correct
Incorrect
-
Question 13 of 29
13. Question
1 pointsThe configuration files of inetd and xinetd are identical and can be used interchangeably. True or False?Correct
Incorrect
-
Question 14 of 29
14. Question
1 pointsWhat does, sshd: ALL, specified in the hosts.deny file indicate?Correct
Incorrect
-
Question 15 of 29
15. Question
1 pointsIt is possible to specify the address of a subnet in the hosts.allow and hosts.deny files. True or False?Correct
Incorrect
-
Question 16 of 29
16. Question
1 pointsThe \etc\nologin file is used to prevent all users from logging on to the system. True or False?Correct
Incorrect
-
Question 17 of 29
17. Question
1 pointsWhat is the PID of the init process?Correct
Incorrect
-
Question 18 of 29
18. Question
1 pointsFor configuring inetd, the files _____ are used:Correct
Incorrect
-
Question 19 of 29
19. Question
1 pointsA host does not have an entry in either hosts.allow or hosts.deny. How does TCP Wrappers handle a request originating from this host?Correct
Incorrect
-
Question 20 of 29
20. Question
1 pointsWhich file specifies the processes to be started during boot time?Correct
Incorrect
-
Question 21 of 29
21. Question
1 pointsWhat does the command, init 6, do?Correct
Incorrect
-
Question 22 of 29
22. Question
1 pointsThe two files used by TCP Wrappers to control access are _____:Correct
Incorrect
-
Question 23 of 29
23. Question
1 pointsWhich of the following scenarios do not require the use of the \etc\nologin file?Correct
Incorrect
-
Question 24 of 29
24. Question
1 pointsWhat happens when you login to a host using telnet?Correct
Incorrect
-
Question 25 of 29
25. Question
1 pointsWhich of the following is not a keyword used to specify the host in the hosts.allow and hosts.deny files?Correct
Incorrect
-
Question 26 of 29
26. Question
1 pointsWhat happens to the service request received by TCP Wrappers if the hosts.allow and hosts.deny files do not permit connection?Correct
Incorrect
-
Question 27 of 29
27. Question
1 pointsYou are currently running the server at run level 3, you need to allow users access to X server applications for several days. Which run level should you switch to?Correct
Incorrect
-
Question 28 of 29
28. Question
1 pointsYou had initially added some hosts in the hosts.deny file to prevent access to FTP. You remove those hosts now because you need to grant them FTP access. How do you restart TCP Wrappers?Correct
Incorrect
-
Question 29 of 29
29. Question
1 pointsWhat does the following snippet in the xinetd configuration file indicate?service telnet { disable = yes ….
Correct
Incorrect