What is the default location for sendmail configuration files? (Please provide the complete path to the directory)
Which file, on a majordomo server, will contain a list of all members' email addresses for the mailing list "linux-users"? (Enter only the file name).
Considering the following excerpt from the httpd.conf file, select the correct answer below:
A. The Indexes directive in the excerpt allows the use of other index-related directives such as DirectoryIndex
B. Both directives AuthConfig and Indexes found in the server's .htaccess file will be overridden by the same directives found in the httpd.conf file
C. The AuthConfig used in the excerpt allows the use of other authentication-related directives such as AuthType
D. The excerpt is incorrect, as the AllowOverride cannot be used with Indexes, since the latter cannot be overridden
E. The excerpt is incorrect, because AllowOverride cannot be used inside a Location section
What is the name of the dovecot configuration variable that specifies the location of user mail?
A. mbox
B. mail_location
C. user_dir
D. maildir
E. user_mail_dir
Which of the following Linux services has support for only the Routing Information Protocol (RIP) routing protocol?
A. gated
B. ipchains
C. netfilter
D. routed
E. zebra
The following data is some of the output produced by a program. Which program produced this output?
strftime (" Thu", 1024, "%a", 0xb7f64380) =4 fwrite ("Thu", 3, 1, 0xb7f614e0) =1 fputc (' ', 0xb7f614e0) =32 strftime (" Feb", 1024, " %b", 0xb7f64380) =4 fwrite ("Feb", 3, 1, 0xb7f614e0) =1 fputc (' ', 0xb7f614e0) =32 fwrite ("19", 2, 1, 0xb7f614e0) =1
A. lsof
B. ltrace
C. nm
D. strace
E. time
Which answer best describes the meaning of the following LDAP search commanD. ldapseareh -x" (and(cn=marie)(telephoneNumber=9*))"
A. It is searching for all entries that don't have the cn attribute equal to marie OR the telephoneNumber attribute starting with number 9
B. It is searching for all entries that have the cn attribute equal to marie AND the telephoneNumber attribute starting with number 9
C. It is searching for all entries that have the cn attribute equal to marie AND the telephoneNumber attribute ending with number 9
D. It is searching for all entries that don't have the cn attribute equal to marie AND the telephoneNumber attribute starting with number 9
E. It is searching for all entries that have the cn attribute different than marie OR the telephoneNumber attribute starting with number 9
Which option is used to configure pppd to use up to two DNS server addresses provided by the remote server?
A. ms-dns
B. nameserver
C. usepeerdns
D. dns
E. None of the above
In the file /var/squid/url_blacklist is a list of URLs that users should not be allowed to access. What is the correct entry in Squid's configuration file to create an acl named blacklist based on this file?
A. acl blacklist urlpath_regex /var/squid/url_blacklist
B. acl blacklist file /var/squid/url_blacklist
C. acl blacklist "/var/squid/url_blacklist"
D. acl blacklist urlpath_regex "/var/squid/url_blacklist"
E. acl urlpath_regex blacklist /var/squid/url_blacklist
Which of the following commands can gather entries from the specified administrative NIS database group?
A. ypserv group
B. getent group
C. rpcinfo group
D. ypbind group
E. yppoll group
When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?
A. All traffic to localhost must always be allowed.
B. It doesn't matter; iptables never affects packets addressed to localhost
C. Sendmail delivers emails to localhost
D. Some applications use the localhost interface to communicate with other applications.
E. syslogd receives messages on localhost
Connecting to a remote host on the same LAN using ssh public-key authentication works but forwarding X11 doesn't. The remote host allows access to both services. Which of the following can be the reason for that behavior?
A. The remote user's ssh_config file disallows X11 forwarding
B. The remote server's sshd_config file disallows X11 forwarding
C. A different public key has to be used for X11
D. X11 cannot be forwarded if public-key authentication was used
E. X11 though SSH needs a special X11 server application installed
How must Samba be configured so that it can check passwords against the ones in /etc/passwd and /etc/shadow?
A. Set the parameters "encrypt passwords = yes" and "password file = /etc/passwd".
B. Set the parameters "encrypt passwords = yes", "password file = /etc/passwd" and "password algorithm = crypt".
C. Delete the smbpasswd file and create a symbolic link to the passwd and shadow file.
D. It is not possible for Samba to use /etc/passwd and /etc/shadow directly.
E. Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file.
Which server program will understand and can reply to NetBIOS name service requests?
A. netbios
B. nmbd
C. smbd
D. winbindd
Which of the following PAM modules will allow the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?
A. pam_filter
B. pam_limits
C. pam_listfile
D. pam_unix