Which Linux command can be used to enforce password policies and aging?
- passwd
- chage
- pam-config
- usermod
The chage command in Linux is used to enforce password policies and aging. It allows system administrators to set password expiration, minimum and maximum password age, and other security-related settings for user accounts. This helps enhance the security of the system by ensuring that passwords are regularly updated.
For a package manager, what is the significance of the "dependency resolution" process?
- It ensures that all required libraries and packages are installed to support a software package.
- It removes unnecessary packages from the system to save space.
- It creates a backup of installed packages.
- It updates the package manager's metadata.
The "dependency resolution" process in a package manager is significant because it ensures that all required libraries and packages are installed to support a software package. It helps in managing complex software dependencies and makes sure that a package can function properly without missing components.
What is the primary function of kernel modules in Linux?
- Extend the functionality of the Linux kernel
- Manage user accounts
- Create GUI interfaces
- Manage system configuration files
Kernel modules in Linux extend the functionality of the Linux kernel. They allow you to add or remove functionality from the kernel without the need to reboot the system. Kernel modules are a key mechanism for adding device drivers, file systems, and other essential functionalities to the kernel.
The ________ statement in Bash allows for decision-making and executing different blocks of code based on a condition.
- if
- for
- while
- switch
The if statement in Bash allows for decision-making. It enables you to execute different blocks of code based on whether a specified condition is true or false. You can use if, elif, and else to handle multiple conditions.
Which protocol is primarily used by SSH for secure remote access?
- SSH
- FTP
- HTTP
- Telnet
SSH (Secure Shell) primarily uses the SSH protocol for secure remote access. SSH is a cryptographic network protocol that ensures secure communication over unsecured networks. It provides authentication and encrypted data transfer.
The _________ directory in Linux is typically used for transient or temporary data, often cleared during boot.
- /home
- /opt
- /tmp
- /var
The /tmp directory in Linux is typically used for transient or temporary data. It is often cleared during system boot to ensure it doesn't accumulate unnecessary files and take up space.
You are trying to optimize a Linux server that handles large amounts of data transfer. Which command would you use to monitor disk activity in real-time?
- iotop
- vmstat
- df
- ifconfig
To monitor disk activity in real-time on a Linux server, you can use the iotop command. It displays a list of processes and their disk I/O usage, helping you identify which processes are the most disk-intensive.
To temporarily save iptables rules, one would use the command iptables-save > ________.
- rules.txt
- config.rules
- iptables.conf
- saved-rules
To temporarily save iptables rules, one would use the command iptables-save > **rules.txt**. This command saves the current firewall rules to a file called "rules.txt" for later use or backup.
Which Linux distribution focuses primarily on security and is often used for penetration testing?
- CentOS
- Fedora
- Kali Linux
- Ubuntu
Kali Linux is a Linux distribution that focuses primarily on security and is widely used for penetration testing and ethical hacking. It comes pre-installed with a variety of security tools and is maintained by Offensive Security.
AppArmor policies are commonly defined using which type of files?
- Profiles
- Blueprints
- Rules
- Directories
AppArmor policies are commonly defined using profiles. These profiles specify the access controls for individual applications or processes, allowing you to confine their behavior and enhance system security.