Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 15 questions
Exam Code: 212-77                Update: Oct 16, 2025
Exam Name: Linux Security

ECCouncil Linux Security 212-77 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

You want to know how long each user's session was the last time they logged on.

Which of the following log files contains this information?

A.

/var/log/utmp

B.

/var/log/usrlog

C.

/var/log/wtmp

D.

/var/log/lastlog

Question # 2

You think that someone has been attempting to hack into your system by attacking your /etc/passwd file. What can you do to increase the security of your system?

A.

Change all the passwords in the /etc/passwd file to x.

B.

Implement shadow passwords using the spasswd command.

C.

Change all the passwords in the /etc/passwd file to *.

D.

Implement shadow passwords using the pwconv command.

Question # 3

An irreparably corrupt ext2 filesystem requires running

A.

fdisk

B.

mkfs

C.

newfs

D.

fsck

Question # 4

What is the name of the file that contains encrypted hashes of passwords on a Linux system?

A.

/etc/shadow

B.

/etc/.passwd

C.

/etc/passwd

D.

/.secure/.htaccess

Question # 5

Assume you have forgotten the current superuser password for your Linux computer. On several Linux distributions, which of the following commands allows you to reset the root user password?

A.

Run the shutdown -r now command, wait until your computer reboots, then at the

LILO Boot prompt enter the linux single command. When you see the prompt, run the

passwd command.

B.

Restart your computer. When your computer reboots, wait until you see the LILO

Boot prompt. At that prompt, enter the init 1 command. When you see the command-line interface prompt, run the passwd command.

C.

Restart your computer. When Linux reboots, log in again, then enter the init 1 command. When you see the command-line interface prompt, run the passwd command.

D.

Restart your computer. When your computer reboots, wait until you see the LILO

Boot prompt. At that prompt, enter the linux single command. When you see the command-line interface prompt, run the passwd command.

Question # 6

When you downloaded a kernel patch from the Internet, the name you clicked on was kernel-patch-2.4.4-66.i386.tar.gz. The file that was downloaded is kernel-patch-2.4.4-66.i386.tgz. Which of the following commands will unarchive this patch from the /tmp directory?

A.

tar cvf /tmp/kernel-patch-2.4.4-66.i386.tgz

B.

tar xzf /tmp/kernel-patch-2.4.4-66.i386.tgz

C.

tar czf /tmp/kernel-patch-2.4.4-66.i386.tgz

D.

tar xvf /tmp/kernel-patch-2.4.4-66.i386.tgz

Question # 7

Your supervisor tells you that she wants a crime database program, /opt/bin/anticrime run at the highest priority. From the ps aux | grep anticrime command, you find that anticrime is currently being run by user jb (your supervisor), with a PID of 1539. Which of the following commands gives the currently running anticrime program a higher priority on your system?

A.

nice -n -10 anticrime

B.

renice -10 1539

C.

renice 10 1539

D.

nice -n 10 anticrime

Question # 8

You're using a communications protocol that cannot handle encrypted passwords.

You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?

A.

grpunconv; passunconv

B.

grpunconv; pwunconv

C.

gconv; passunconv

D.

gconv; pwunconv

Question # 9

Which of the following configuration options for kernel enable you to effectively make your computer a router?

A.

CONFIG_FIREWALL

B.

CONFIG_IP_FIREWALL

C.

CONFIG_SYN_COOKIES

D.

CONFIG_IP_FORWARD

Question # 10

Which of the following steps would not substantially improve security over the typical Linux installation to a computer with typical hardware and settings?

A.

Set a BIOS password.

B.

Remove servers that were installed by default but that are not being used.

C.

Set the computer to boot from a CD-ROM before a floppy.

D.

Lock the computer case shut.

Page: 1 / 2
Total 15 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025