- Hai risposto in modo non corretto a.... 1) which of the following lines can used to assign to the variable TOTAL the value of 4 - 2 ? + let TOTAL=4-2 2) You are told to use the 172.16.1.143 IP address in the 172.16.1.0/24 network, which commands you must use to setup the network of your workstation? + ifconfig eth0 172.16.1.143 3) The group foobar is protected by a password. Who needs to know this password? + diventa invece possibile ad altri utenti diventare membri del gruppo, fornendo la relativa password (man chgpasswd ; man newgrp) 4) you want to put a predefined .ssh/known_hosts file in the home of very user you add to the system. where do you place a template for it? + /etc/skel 5) Using BSD style printing, which of the following command will remove all print jobs from the default print queue? + lprm - 6) which port is used by CUPS prining system? + 631 7) you need to reconfigure the KDM display mnanager, which file will you edit? + kdmrc 8) which of the following command you can use to remove the group foo from your ystem? + groupdel foo 9) which file in the user home is read by a interactive bash shell? + .bashrc 10) You just added the following line to your crontab: * * * * * date >> /tmp/foo but after some minutes the file /tmp/foo is still empty, which could be the problem? - you dont have permission to write /tmp/foo - you miss the username under which the command will be run - you cant use a redirection in crontab - that is not a valid crontab entry + missing a new line at the end of the line 11) You want to remove from table foobar the record having value foo for column bar. Which SQL statement you will use? - DELETE bar = 'foo' FROM foobar - MODIFY foobar DELETE WHERE bar = 'foo' - DELETE FROM foobar WHERE bar = 'foo' - UPDATE foobar REMOVE WHERE bar = 'foo' + 12) In which file you will find an entry like this ? foobar:*:foo:bar,foo (give the full pathname) - /etc/group + /etc/gshadow 1. nome del gruppo. 2. password cifrata/*/! 3. utenti amministratori del gruppo (lista separata da virgole). 4. utenti appartenenti al gruppo (lista separata da virgole). 13) to avoid annoing brute force attacks to you ssh seerver, that riempe il log you change the listening port to 222, how modify ? + use the directive Host and Port in the ssh_config file 14) Which command you can use to change the default shell of a user? (write just the command name, no options or arguments) + chsh 15) which service usually listen on port 23? + telnet 16) Which of the following programs can be used to schedule jobs to be run at regular intervals? + anacron + batch + cron + at 17) Which network protocol is used by an MTA? (write just the acronym letters capitalized) + SMTP 18) which protocol is used by command ping? + ICMP 19) You wrote a script foobar that parse the log files looking for suspicious logins during the night. You wat to run it at 7:00am so you can have the results when you went at work. Which of the following command you can use? - at 7:00 tomorrow -l foobar - at 7:00 -b foobar + at 7:00 foobar - at 7:00 tomorrow < foobar 20) The user of the account foobar has been fired and you need to remove the account and its home directory from the system. Assuming you are root what command would you type to do this? (include necessary switches and/or parameters) + userdel -r foobar 21) you found thay a server is accepting connecion to port 666, which command you can use to find the program listening on that port? + lsof 22) which is the format of the password file /etc/passwd ? + username:password:UID:GID:commento:home:shell 23) Which file usually contains the main system log on a Debian system? n /var/log/messages + /var/log/syslog - /var/log/system - /var/log/mainlog 24) Henry Jones just joined your company, so you have to change Indiana username from jones to ijones. Which is the best way? + usermod -l ijones jones (il parametro e': -l ) - this cannot be done n usermod -l jones ijones - modifica /etc/passwd 25) which command you must use to edit list of jobs scheduled for execution by cron? only command n crontab + crontab -e 26) You are configuring the shadow password system. Which of the following are the valid fields in the shadow file? (choose all that apply) - number of days since password was last changed - " " " after which password must be changed + " " " to warn user of an expiring password n password for the user default group 27) In a sendmail compatible MTA, which command can be used to inspect the queue of messages waiting delivery? + 28) The SQL statement JOIN is used to: - join 2 tables records adding the records of h second at the end of the first - return the records of 2 tables merging the columns of both in a single row - return selected records from 2 tables for which there is a match in the value of a common column - merge the content of 2 tables in a new one with the columns of the second one added to the first one 29) Your boss told you that user foobar is leaving the company the 12th August 2007, and asked you to block his account starting from that day. Which of the following command you can use? - passwd -e 2007-08-12 foobar - userdel -e 2007-08-12 foobar n chage -e 2007-08-12 foobar + usermod -e 2007-08-12 foobar 30) Which file is used by the GDM display manager to start the user session? n .xinitr in user home - /etc/gdm/Xinit - /etc/X11/Xsession + /etc/gdm/Xsession - the .xsession in user home