212-77 ECCouncil Linux Security Free Practice Exam Questions (2025 Updated)
Prepare effectively for your ECCouncil 212-77 Linux Security certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
You're using a communications protocol that cannot handle encrypted passwords.
You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?
How can you best see how much free space you have in your current directory?
What command would you type to change the ownership of somefile.txt from Ralph to tony?
Which of the following commands configures the laura account to expire on
January 1, 2005?
On Linux systems, how can root logins be restricted?
An irreparably corrupt ext2 filesystem requires running
You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a
and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?
Upon boot, the kernel starts init. What does init start next?
Under the bash shell which is the most appropriate place to set environment variables that apply to all users?
How should you engage users in helping to secure your computer's passwords?
Which of the following is true of Linux passwords?
Which of the following lines would log all messages from news to the file /var/log/newslog?
A computer is chained firmly to the wall, all of its accounts are secured with good shadowed passwords, and it's configured to boot only from its hard disk, but the system has no BIOS or boot loader password. No users are currently logged into this system. How might a malicious individual without an account on this system corrupt it if given a few minutes alone with it? (Choose two)
One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?
As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory. Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?