Chapter 23 Test Bank Develop A Network Security Policy - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.

Chapter 23 Test Bank Develop A Network Security Policy

Linux Essentials for Cybersecurity (Rothwell/Kinsey)

Chapter 23 Develop a Network Security Policy

1) Which of the following is not one of the three key components of a network security policy?

A) Network Time Protocol

B) Kernel parameters

C) Firewalls

D) TCP wrappers

2) Kernel parameters modify the behavior of the kernel by adjusting key features, such as which of the following?

A) Optimizing memory usage

B) Enhancing the security of the system

C) Changing how the kernel manages devices

D) All of the above

3) Kernel parameters can be modified by making changes in the __________ file.

A) /etc/sysctl.conf

B) /etc/hosts.deny

C) /usr/bin

D) /etc/hosts.allow

4) Which of the following commands is often used to determine if a remote host is accessible through the network?

A) ldd

B) echo

C) ping

D) libwrap

5) Responding to ping requests can leave a system vulnerable to which of the following?

A) TCP wrappers

B) DoS attacks

C) Man-in-the-middle attacks

D) All of the above

6) __________ are used when server programs that have been compiled with the libwrap library call that library when a system tries to access the service.

A) Ping requests

B) Kernel parameters

C) TCP wrappers

D) Firewalls

7) Which of the following commands can be used to determine which services use the libwrap library?

A) echo

B) libwrap

C) grep

D) ldd

8) The syntax of the rules in the /etc/hosts.allow and /etc/hosts.deny files is __________.

A) service_list: client_list [options]

B) client_list: service_list [options]

C) server_list: client_list [options]

D) client_list: server_list [options]

9) Which of the following values for the client_list command matches clients that can be resolved via the hostname resolver?

A) LOCAL

B) KNOWN

C) ALL

D) UNKNOWN

10) Which of the following values for the client_list command matches clients without a dot in their hostname?

A) LOCAL

B) KNOWN

C) ALL

D) UNKNOWN

11) The system clock for a network can be set manually or configured from which of the following?

A) Kernel parameter

B) TCP wrapper

C) NTP server

D) Ping request

12) Which of the following commands displays the system clock?

A) time

B) ls

C) clock

D) date

13) Which of the following date formats displays the day of the month?

A) %D

B) %m

C) %d

D) %Y

14) Which of the following date formats displays the full weekday name (such as Sunday)?

A) %A

B) %b

C) %a

D) %B

15) Which of the following methods sets the system clock to the specified time?

A) set-ntp [0|1]

B) set-time [time]

C) set-timezone [zone]

D) tzselect

16) Which of the following is a menu-driven, CLI-based tool that allows a user to select a time zone?

A) set-timezone

B) set-ntp

C) tzselect

D) set-time

17) On Red Hat-based distributions, the system time zone is set by the __________ file.

A) /usr/share/zoneinfo

B) /etc/timezone

C) /usr/bin/tzselect

D) /etc/localtime

18) Which setting for the /etc/ntp.conf file is used to regularly update the system clock without having to access an NTP server?

A) restrict

B) driftfile

C) server

D) None of the above

19) Which of the following is a link to a cluster of NTP servers that are geographically spread throughout the world?

A) pool.ntp.org

B) /etc/ntp.conf

C) onecoursesource.com

D) None of the above

20) Which of the following options for the ntpq command is used to list host IP addresses rather than names?

A) -h

B) -p

C) -n

D) -d

Document Information

Document Type:
DOCX
Chapter Number:
23
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 23 Develop A Network Security Policy
Author:
William Rothwell

Connected Book

Answer Key + Test Bank | Linux Essentials 1e Rothwell

By William Rothwell

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party