An administrator wants to issue the command echo 1 >/var/ log/boater.log once all of the scripts in / etc/rc2.d have been executed. What is the best way to accomplish this?
A. Add the command to /etc/rc.local
B. Create a script in ~/.kde/Autostart/ and place the command in it
C. Create a script in /etc/init.d/ and place a link to it in /etc/rc2.d/
D. Create a script in /etc/rc2.d/ and place the command in it
Where should the LILO code reside, on a system with only one installation of Linux and no other operating systems?
A. In the master boot record
B. In the boot sector
C. In the /boot directory
D. At the start of the kernel
The internal network (192.168.1.0-192.168.1.255) needs to be able to relay email through the site's sendmail server. What line must be added to /etc/mail/access to allow this?
A. 192.168.1.0/24 RELAY
B. 192.168.1 RELAY
C. 192.168.1.0/24 OK
D. 192.168.1 OK
The mailserver is currently called fred, while the primary MX record points to mailhost.example.org. What must be done to direct example.org email towards fred?
A. Add an A record for mailhost to fred's IP address.
B. Add a CNAME record from mailhost to fred
C. Add another MX record pointing to fred's IP address.
D. Add a PTR record from mailhost to fred.
A malicious user has sent a 35MB video clip, as an attachment, to hundreds of Recipients. Looking in the outbound queue reveals that this is the only mail there.
This mail can be removed with the command rm _______________ * . Complete the path below.
A. /var/spool/mqueue/
Specify the command to create a SSH key-pair. (Specify ONLY the command without any path or parameters.)
A. ssh-keygen
What option in the client configuration file would tell OpenVPN to use a dynamic source port when making a connection to a peer?
A. src-port
B. remote
C. source-port
D. nobind
In a PAM configuration file, which of the following is true about the sufficient control flag in the following line?
Auth sufficient pam_module.so
A. This PAM module is called if it is present, otherwise, further modules will be tried.
B. This module is sufficient to determine both success or failure of an authentication attempt and no other modules will need to be tried.
C. Failure of this module will not be considered fatal and, if the module succeeds, success will be returned to the application immediately without considering and further modules.
D. If a previous required module fails, success of this module will be used to check if further modules in the stack should be tried.
What command is used to reload a set of saved netfilter rules?
A. iptables-restore
B. iptables-recover
C. iptables-load
D. iptables-reload
A user requests a "hidden" Samba share, named confidential, similar to the Windows Administration Share. How can this be configured?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E