Book Image

LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500 - Second Edition

By : Steve Suehring
Book Image

LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500 - Second Edition

By: Steve Suehring

Overview of this book

LPIC-1: Linux Professional Institute Certification Practice Tests is the must-have complement to the bestselling LPIC-1 Study Guide. Practice tests help you gain confidence and identify the areas in need of more attention. Ten full-length tests, covering the ten objective domains, and two additional 60-question practice exams contain 1000 practice questions, complete with answers and full explanations! Divided into two parts, this volume of practice tests covers Exams 101-500 and 102-500. Part I covers system architecture, Linux installation and Package management, GNU and Unix Commands, and devices, and Linux filesystems and filesystem hierarchy. Part II focuses on shells and shell scripting, user interfaces and desktops, administrative tasks, essential system services, networking, and security.
Table of Contents (10 chapters)

Chapter 10
Topic 110: Security

THE FOLLOWING EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • images  110.1 Perform security administration tasks.
    • Key knowledge areas:
      • Audit a system to find files with suid sgid bit set.
      • Set or change user passwords and password aging information.
      • Be able to use nmap and netstat to discover open ports on a system.
      • Set up limits on user logins, processes, and memory usage.
      • Determine which users have logged in to the system or are currently logged in.
      • Basic sudo configuration and usage
    • The following is a partial list of the used files, terms, and utilities:
      • find
      • passwd
      • fuser
      • lsof
      • nmap
      • chage
      • netstat
      • sudo
      • /etc/sudoers
      • su
      • usermod
      • ulimit
      • who, w, last
  • images110.2 Setup host security.
    • Key knowledge areas:
      • Awareness of shadow passwords and how they work
      • Turn off network services not in use.
      • Understand the role of TCP wrappers.
    • The following is a partial list of the used files, terms, and utilities:
      • /etc/nologin
      • /etc/passwd
      • /etc/shadow
      • /etc/xinetd.d/
      • ...