SELinux operates under what primary modes?
- Enforcing and Permissive
- Passive and Active
- Standard and Enhanced
- Basic and Advanced
SELinux operates under two primary modes: Enforcing and Permissive. In Enforcing mode, SELinux actively enforces security policies and denies any actions that violate these policies. In Permissive mode, SELinux logs policy violations but doesn't actively deny them, making it a useful mode for policy debugging.
To ensure a consistent policy across machines, SELinux policies can be stored in _________ format.
- YAML
- XML
- Binary
- Text
To ensure a consistent policy across machines, SELinux policies can be stored in Text format. The SELinux policy language is human-readable and editable in text format, making it easier to understand and manage security policies.
The ________ statement in Bash allows for decision-making and executing different blocks of code based on a condition.
- if
- for
- while
- switch
The if statement in Bash allows for decision-making. It enables you to execute different blocks of code based on whether a specified condition is true or false. You can use if, elif, and else to handle multiple conditions.
What is the primary function of kernel modules in Linux?
- Extend the functionality of the Linux kernel
- Manage user accounts
- Create GUI interfaces
- Manage system configuration files
Kernel modules in Linux extend the functionality of the Linux kernel. They allow you to add or remove functionality from the kernel without the need to reboot the system. Kernel modules are a key mechanism for adding device drivers, file systems, and other essential functionalities to the kernel.
For a package manager, what is the significance of the "dependency resolution" process?
- It ensures that all required libraries and packages are installed to support a software package.
- It removes unnecessary packages from the system to save space.
- It creates a backup of installed packages.
- It updates the package manager's metadata.
The "dependency resolution" process in a package manager is significant because it ensures that all required libraries and packages are installed to support a software package. It helps in managing complex software dependencies and makes sure that a package can function properly without missing components.
Which Linux command can be used to enforce password policies and aging?
- passwd
- chage
- pam-config
- usermod
The chage command in Linux is used to enforce password policies and aging. It allows system administrators to set password expiration, minimum and maximum password age, and other security-related settings for user accounts. This helps enhance the security of the system by ensuring that passwords are regularly updated.
The iptables command that allows traffic only from a specific IP address, say 10.0.0.1, to a specific port, say 22, uses the ________ option.
- -s
- -p
- -dport
- -A
The iptables command that allows traffic only from a specific IP address, say 10.0.0.1, to a specific port, say 22, uses the -s (source) option. This option specifies the source IP address from which traffic is allowed.
To change the primary group of a user, the ________ command is utilized.
- usermod -g
- groupmod -g
- chgrp -p
- adduser -G
To change the primary group of a user, the "usermod -g" command is utilized. This command allows you to modify the primary group of an existing user. The "-g" option specifies the new primary group.
In the context of networking, what does the acronym "NAT" stand for?
- Network Address Translation
- Network Access Token
- Network Analysis Tool
- Network Authentication Protocol
In the context of networking, "NAT" stands for Network Address Translation. NAT is a technique used to modify network address information in packet headers while in transit. It's commonly used to allow multiple devices on a local network to share a single public IP address for internet access.
Your Linux system is experiencing slow boot times. Which tool can you use to analyze the time taken by each boot process?
- systemd-analyze
- top
- iostat
- ps
To analyze the time taken by each boot process on a Linux system, you can use the systemd-analyze command. It provides detailed information about the startup time of services and processes, helping you identify bottlenecks in the boot process.
The ________ mechanism in Linux allows processes to communicate with each other, commonly used in IPC.
- Inter-Process Communication (IPC)
- Inter-System Communication (ISC)
- Inter-Process Messaging (IPM)
- Intra-Process Communication (IPC)
The "Inter-Process Communication (IPC)" mechanism in Linux allows processes to communicate with each other. IPC is essential for processes to exchange data and synchronize their activities, and it's commonly used in various applications and services in Linux.
The ________ file in Linux is used to configure network interfaces and is typically found in the /etc/network/ directory.
- interfaces
- network.conf
- ifcfg
- resolv.conf
The file in Linux used to configure network interfaces and typically found in the /etc/network/ directory is the "interfaces" file. This file contains information about network interfaces and their settings, allowing you to define and manage network connections on your system.