What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)
What happens when the command getfattr afile is run while the file afile has no extended attributes set?
A. getfattr prints a warning and exits with a values of 0.
B. getfattr prints a warning and exits with a value of 1.
C. No output is produced and getfattr exits with a value of 0.
D. No outputs is produced and getfattr exits with a value of 1
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
How are SELinux permissions related to standard Linux permissions? (Choose TWO correct answers.)
A. SELinux permissions overnde standard Linux permissions.
B. standard Linux permissions override SELinux permissions.
C. SELinux permissions are verified before standard Linux permissions.
D. SELinux permissions are verified after standard Linux permissions.
Answer:
B, D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)
A. ACL
B. GRANT
C. GROUP
D. OWNER
E. SID
Answer:
A, C, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 9
Which of the following are differences between AppArmor and SELinux? (Choose TWO correct answers).
A. AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.
B. AppArmor is less complex and easier to configure than SELinux.
C. AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.
D. SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.
E. The SELinux configuration is loaded at boot time and cannot be changed later on AppArmor provides user space tools to change its behavior.
Answer:
B, D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)
A. default
B. system
C. owner
D. trusted
E. user
Answer:
B, D, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 11
Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)
A. !/var/run/.*
B. append: /var/log/*
C. /usr=all
D. #/bin/
E. /etc p+i+u+g
Answer:
A, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 12
Which of the following commands defines an audit rule that monitors read and write operations to the file/ etc/firewall/rules and associates the rule with the name firewall?
A. auditctl -N firewall –r r: /etc/firewall/rules –r w: etc/firewall/rules
B. auditctl -A –f /etc/firewall/rules –o r– o w –l firewall
C. auditctl –w /etc/firewall/rules -p rw -k firewall
D. auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall
E. echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" | auditctl ~
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 13
Which of the following resources of a shell and its child processes can be controlled by the Bash build-in command ulimit? (Choose THREE correct answers.)
A. The maximum size of written files
B. The maximum number of open file descriptors
C. The maximum number of newly created files
D. The maximum number of environment variables
E. The maximum number of user processes
Answer:
A, B, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 14
Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).
A. host
B. shadow
C. service
D. passwd
E. group
Answer:
A, C, E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 15
Which of the following types can be specified within the Linux Audit system? (Choose THREE correct answers)