How should an administrator test that Domain Name Services (DNS) are working correctly on a client workstation?
A -
ping 168.168.168.18
B -
telnet 168.168.168.18
C -
nslookup www.comptia.org
D -
ftp.comptia.org
2-
A user executed a Pearl script that initiated a connection request to a server without ever completing the network connection. This was done multiple times until the server could no longer communicate on the network. What kind of attack was initiated?
A -
Trojan horse
B -
Spoofing
C -
Buffer overflow
D -
Denial of Service
3-
A Linux system seems to be unstable, with several services unresponsive. Before rebooting, which of the following commands could be entered to help ensure the system restarts into a stable state?
A -
sync
B -
lilo
C -
uptime
D -
fack
4-
Based on best practices, where is the best location to maintain documentation of work performed on Linux servers at a site?
A -
In a text file on the local machine where the changes were made.
B -
Off-site at a different facility.
C -
In a binder in the server room.
D -
In a text file kept on a Linux file server.
5-
An application is created that is called through the Web server. However, upon restarting the Web server, it is discovered that the application is not writing its error to the Web error log properly. Which of the following methods would resolve the problem?
A -
Change the application to write its error logs into the /root directory.
B -
Change the permission and ownerships of the application to match the user.group of the Web server.
C -
Change the Web server user to 'root' so that applications run within it will run as root.
D -
The application does not have sufficient rights to write the directory specified, so the suid bit on the application must be set to allow it to run as root.
6-
Configuring host.deny and hosts.allow will protect the server from intruders that attempt which if the following?
A -
Exploitation of services that are started with TCP wrappers.
B -
Attacks from machines using TCP.
C -
Exploitation of ICMP security holes.
D -
Attacks from machines using IPX/SPX.
7-
A user has installed and configured an internal modem to connect the workstation to the Internet. The user claims that the modem is not connecting properly. What diagnostic tool can be used to test the modem?
A -
pppconfig
B -
mgetty
C -
a web browser
D -
minicom
8-
Which utility can remove, list, and add modules, as well as autoclean?
A -
modprobe
B -
Modconfigurator
C -
insmod
D -
lsmod
9-
Which command will verify that an NIS client is bound to an NIS server?
A -
pconfig
B -
ypwhich
C -
nisbind
D -
nis.client
10-
A customer reports that his server will not allow users to retrieve their email through POP3 or connect to the server via telnet. What service needs to be restarted?