Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

212-77 ECCouncil Linux Security Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 212-77 Linux Security certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 51 questions

You're using a communications protocol that cannot handle encrypted passwords.

You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?

A.

grpunconv; passunconv

B.

grpunconv; pwunconv

C.

gconv; passunconv

D.

gconv; pwunconv

How can you best see how much free space you have in your current directory?

A.

Use du .

B.

Use df .

C.

Use du /

D.

Use df

E.

Use df /

What command would you type to change the ownership of somefile.txt from Ralph to tony?

A.

chmod somefile.txt tony

B.

chown somefile.txt tony

C.

chown ralph.tony somefile.txt

D.

chown tony somefile.txt

Which of the following commands configures the laura account to expire on

January 1, 2005?

A.

chage -E 2005/01/01 laura

B.

usermod -e 2005 laura

C.

usermod -e 2005-01-01 laura

D.

chage -I 2005-01-01 laura

On Linux systems, how can root logins be restricted?

A.

With the /etc/default/login file

B.

With the /etc/default/useradd file

C.

With the .profile file

D.

With the /etc/securetty file

An irreparably corrupt ext2 filesystem requires running

A.

fdisk

B.

mkfs

C.

newfs

D.

fsck

You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a

and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?

A.

You did not assign a valid password to Mary's account.

B.

You did not set the appropriate permissions to her home directory.

C.

You did not create her home directory.

D.

You cannot create a new user account by manually editing the /etc/passwd file.

Upon boot, the kernel starts init. What does init start next?

A.

/etc/rc.d/init.d

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/initdefault

D.

/etc/inittab

Under the bash shell which is the most appropriate place to set environment variables that apply to all users?

A.

/etc/skel

B.

rc.sysinit

C.

/etc/profile

D.

/etc/bashrc

E.

rc.local

How should you engage users in helping to secure your computer's passwords?

A.

Educate them about the importance of security, the means of choosing good passwords, and the ways crackers can obtain passwords.

B.

Instruct your users to e-mail copies of their passwords to themselves on other systems

so that they're readily available in case of an emergency

C.

Enforce password change rules but don't tell users how crackers obtain passwords since you could be educating a future cracker.

D.

Give some of your users copies of the encrypted database file as backup in case a cracker breaks in and corrupts the original.

Which of the following is true of Linux passwords?

A.

They are changed with the password utility.

B.

They must be changed once a month.

C.

They may consist only of lowercase letters and numbers.

D.

They may be changed by the user who owns an account or by root.

Which of the following lines would log all messages from news to the file /var/log/newslog?

A.

news.* /var/log/newslog

B.

news.!* /var/log/newslog

C.

news.*;news.!=info /var/log/newslog

D.

*news /var/log/newslog

A computer is chained firmly to the wall, all of its accounts are secured with good shadowed passwords, and it's configured to boot only from its hard disk, but the system has no BIOS or boot loader password. No users are currently logged into this system. How might a malicious individual without an account on this system corrupt it if given a few minutes alone with it? (Choose two)

A.

The intruder could reboot it, reconfigure it to boot from floppy, boot a DOS floppy, and use DOS's disk utilities to delete the Linux partitions and erase the hard disk.

B.

The intruder could open the case, remove the hard disk and insert it in another computer, then modify the configuration files and return the hard disk to the original machine.

C.

The intruder could run a password-cracking program on the system's /etc/passwd file, thus obtaining all the user's passwords for use in further compromising the system at a later date.

D.

The intruder could utilize a bug in su, passwd, or some other SUID root program to acquire root privileges and then alter the system's configuration files.

One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?

A.

Someone is using your Web site to test their connectivity to the Internet.

B.

Someone is using a DoS attack on your Web site.

C.

There is no problem; this is normal traffic from DNS servers and Internet routers checking connectivity to your Web site.

D.

There is insufficient capacity on the Internet connection to your Web site.

As the developers in your company work on the newest security software, Antiterror, different versions of the beta are being released weekly. The current version, antiterror-7, is located in the /opt/bin/antiterror-7 directory. Later versions will be released in parallel directories; for example, the next version will be located in the /opt/bin/antiterror-8 directory. Everyone who is testing this software is running the /opt/test/antiterror command. Which of the following actions would ensure that the testers get the latest version of the software next week?

A.

ln /opt/test/antiterror /opt/bin/antiterror-7/antiterror-7

B.

ln antiterror /opt/bin/antiterror-8/antiterror-8

C.

ln /opt/test/antiterror.lnk /opt/bin/antiterror-8/antiterror-8

D.

ln /opt/test/antiterror /opt/bin/antiterror-8/antiterror-8

Page: 1 / 1
Total 51 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved