Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EC-Council 212-77 Exam - Cheat-Test.com

Free 212-77 Sample Questions:

Q: 1:
Which of the following is true of Linux passwords?

A. They are changed with the password utility.
B. They must be changed once a month.
C. They may consist only of lowercase letters and numbers.
D. They may be changed by the user who owns an account or by root.

Answer: A

Q: 2:
Assume that you have just logged on as a regular user. Which of the following commands allows you to edit the file with user passwords associated with the Shadow Password Suite?

A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd

Answer: B

Q: 3:
Under the bash shell which is the most appropriate place to set environment variables that apply to all users?

A. /etc/skel
B. rc.sysinit
C. /etc/profile
D. /etc/bashrc
E. rc.local

Answer: A

Q: 4:
Which of the following measures is the most effective way to prevent attacks through various network services?

A. Disable a service in the appropriate /etc/xinetd.d configuration file.
B. Use a firewall to drop all requests to unneeded services.
C. Block service requests with the appropriate commands in /etc/hosts.deny.
D. Uninstall unneeded network services.

Answer: D

Q: 5:
Which of the following statements applies to the IP address 192.168.0.1?

A. It is reserved.
B. It cannot be assigned to a host that accesses the Internet.
C. It is designated for multicast transmission.
D. It can be freely assigned to a host on a private network

Answer: A

Q: 6:
Which of the following are ways to disable dynamic routing?

A. The linuxconf Gated Daemon screen
B. The linuxconf Routed Daemon screen
C. echo "0" > /proc/sys/net/ipv4/dynamic_routing
D. Editing /etc/sysconfig/network-scripts

Answer: B

Q: 7:
Which of the following is not a Linux DHCP client?

A. dhcpcd
B. pump
C. dhcpd
D. dhclient

Answer: A

Q: 8:
How should you engage users in helping to secure your computer's passwords?

A. Educate them about the importance of security, the means of choosing good passwords, and the ways crackers can obtain passwords.
B. Instruct your users to e-mail copies of their passwords to themselves on other systems
so that they're readily available in case of an emergency.
C. Enforce password change rules but don't tell users how crackers obtain passwords since you could be educating a future cracker.
D. Give some of your users copies of the encrypted database file as backup in case a cracker breaks in and corrupts the original.

Answer: A

Q: 9:
Which of the following are risks of SUID and SGID programs? (Choose two)

A. Bugs in the programs may cause more damage than they would in ordinary programs.
B. The program files are large and thus may cause a disk to run out of space.
C. Because the programs require password entry, running them over an insecure network link runs the risk of password interception.
D. Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible.

Answer: B, D

Q: 10:
You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information?

A. man syslog 3
B. man 3 syslog
C. man syslog -3
D. man -3 syslog

Answer: B

Q: 11:
Which statement describes the cron daemon?

A. Manages scheduling of routine system tasks
B. Manages all incoming connections and spawns off child processes
C. Is responsible for file sharing across a network
D. Keeps track of system messages and errors
E. Manages the printing subsystem

Answer: B

Q: 12:
You're using a communications protocol that cannot handle encrypted passwords.
You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?

A. grpunconv; passunconv
B. grpunconv; pwunconv
C. gconv; passunconv
D. gconv; pwunconv

Answer: B

Q: 13:
What would the following command do?
cat MyFile | sort | tee | lpr

A. Print the contents of MyFile in alphabetical order and display the contents of MyFile
in sorted order.
B. Print the contents of MyFile in alphabetical order and display the contents of MyFile.
C. It would not work because it contains too many pipes. D. Print the contents of MyFile in alphabetical order.

Answer: A

Q: 14:
You inadvertently change the permission block on /usr/bin/passwd command to
-r-xr-xr-x.
What would be the effect of this change?

A. No changes in how the command runs would occur.
B. Users could no longer change their passwords because they do not have write permissions to /etc/passwd.
C. Users' passwords would not expire.
D. Shadow passwords would quit working.

Answer: B

Q: 15:
One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The
protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?

A. Someone is using your Web site to test their connectivity to the Internet.
B. Someone is using a DoS attack on your Web site.
C. There is no problem; this is normal traffic from DNS servers and Internet routers checking connectivity to your Web site.
D. There is insufficient capacity on the Internet connection to your Web site.

Answer: B

Q: 16:
When you look through the /var/log directory you see a new file, httpd.crit. Assume that it is a legitimate file, created for legitimate reasons. Which of the following statements is the best possible description of this file?

A. It contains error messages related to access to your Apache Web server.
B. It includes critical notices related to access through your router.
C. It contains critical information related to your Web access.
D. It includes critical messages about the actions taken by your Apache Web server.

Answer: B

Q: 17:
When you downloaded a kernel patch from the Internet, the name you clicked on was kernel-patch-2.4.4-66.i386.tar.gz. The file that was downloaded is kernel-patch-2.4.4-66.i386.tgz. Which of the following commands will unarchive this patch from the /tmp directory?

A. tar cvf /tmp/kernel-patch-2.4.4-66.i386.tgz
B. tar xzf /tmp/kernel-patch-2.4.4-66.i386.tgz
C. tar czf /tmp/kernel-patch-2.4.4-66.i386.tgz
D. tar xvf /tmp/kernel-patch-2.4.4-66.i386.tgz

Answer: C

Q: 18:
Your supervisor tells you that she wants a crime database program, /opt/bin/anticrime run at the highest priority. From the ps aux | grep anticrime command, you find that anticrime is currently being run by user jb (your supervisor), with a PID of 1539. Which of the following commands gives the currently running anticrime program a higher priority on your system?

A. nice -n -10 anticrime
B. renice -10 1539
C. renice 10 1539
D. nice -n 10 anticrime

Answer: C

Q: 19:
What does the command "ps" do?

A. Prints the directory
B. Print status of LPT1
C. Shows what processes are running
D. Produces system statistics

Answer: C

Q: 20:
A user is logged into the Linux workstation, what is the best way to login to root from a shell prompt?

A. chuser root
B. root
C. login root
D. su

Answer: D

Q: 21:
You want to know how long each user's session was the last time they logged on. Which of the following log files contains this information?

A. /var/log/utmp
B. /var/log/usrlog
C. /var/log/wtmp
D. /var/log/lastlog

Answer: D

Q: 22:
You want to allow Linux users running StarOffice to directly edit files stored on a Windows 2000 SMB/CIFS file server. Which of the following would you use to enable this?

A. Linux's standard NFS file sharing support
B. The Linux smbclient program
C. An FTP server running on the Windows system
D. The Linux smbmount program

Answer: B

Q: 23:
Which of the following umask values will result in files with rw-r----- permissions?

A. 640
B. 022
C. 210
D. 027

Answer: A

Q: 24:
You add the following line to the /etc/passwd file mary::122:50:Mary Jones:/home/mary:/bin/bash a and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?

A. You did not assign a valid password to Mary's account.
B. You did not set the appropriate permissions to her home directory.
C. You did not create her home directory.
D. You cannot create a new user account by manually editing the /etc/passwd file.

Answer: C

Q: 25:
Which of the following types of information is returned by typing ifconfig eth0? (Choose two)

A. The names of programs that are using eth0
B. The IP address assigned to eth0
C. The hardware address of eth0
D. The hostname associated with eth0

Answer: B, D

Q: 26:
Which of the following commands gives you the current routing table without requiring network activity to access a DNS server?

A. netstat -r
B. netstat
C. route
D. route -n

Answer: A

Q: 27:
An irreparably corrupt ext2 filesystem requires running:

A. fdisk
B. mkfs
C. newfs
D. fsck

Answer: D

Q: 28:
Which of the following is an advantage of designating one well-protected computer to record log files for several other computers?

A. You can log information to a separate computer that you can't log locally.
B. Logging information in this way minimizes network use.
C. The logging system can analyze the logs using Tripwire.
D. Logs stored on a separate computer are less likely to be compromised by a cracker.

Answer: C

Q: 29:
Which of the following lines would log all messages from news to the file /var/log/newslog?

A. news.* /var/log/newslog
B. news.!* /var/log/newslog
C. news.*;news.!=info /var/log/newslog
D. *news /var/log/newslog

Answer: D

Q: 30:
Which of the following configuration options for kernel enable you to effectively make your computer a router?

A. CONFIG_FIREWALL
B. CONFIG_IP_FIREWALL
C. CONFIG_SYN_COOKIES
D. CONFIG_IP_FORWARD

Answer: A


© 2014 Cheat-Test.com, All Rights Reserved