You want to know how long each user's session was the last time they logged on.
Which of the following log files contains this information?
You think that someone has been attempting to hack into your system by attacking your /etc/passwd file. What can you do to increase the security of your system?
An irreparably corrupt ext2 filesystem requires running
What is the name of the file that contains encrypted hashes of passwords on a Linux system?
Assume you have forgotten the current superuser password for your Linux computer. On several Linux distributions, which of the following commands allows you to reset the root user password?
When you downloaded a kernel patch from the Internet, the name you clicked on was kernel-patch-2.4.4-66.i386.tar.gz. The file that was downloaded is kernel-patch-2.4.4-66.i386.tgz. Which of the following commands will unarchive this patch from the /tmp directory?
Your supervisor tells you that she wants a crime database program, /opt/bin/anticrime run at the highest priority. From the ps aux | grep anticrime command, you find that anticrime is currently being run by user jb (your supervisor), with a PID of 1539. Which of the following commands gives the currently running anticrime program a higher priority on your system?
You're using a communications protocol that cannot handle encrypted passwords.
You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?
Which of the following configuration options for kernel enable you to effectively make your computer a router?
Which of the following steps would not substantially improve security over the typical Linux installation to a computer with typical hardware and settings?