Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)
A, E
Which of the following commands defines an audit rule that monitors read and write operations to
the file/ etc/firewall/rules and associates the rule with the name firewall?
C
Which of the following resources of a shell and its child processes can be controlled by the Bash
build-in command ulimit? (Choose THREE correct answers.)
A, B, E
Which of the following database names can be used within a Name Service Switch (NSS)
configuration file? (Choose THREE correct answers).
A, C, E
Which of the following types can be specified within the Linux Audit system? (Choose THREE correct
answers)
A, B, E
Which PAM module checks new passwords against dictionary words and enforces complexity?
(Specially the module name only without any path.)
pam_cracklib
Explanation:
http;//www-deer-run.com/~hal/sysadmin/pam_cracklib.html
Which command installs and configures a new FreelPA server, including all sub-components, and
creates a new FreelPA domain? (Specially ONLY the command without any path or parameters).
ipa-server-
install
Explanation:
https://www.freeipa.org/images/2/2b/lnstallation_and_Deployment.Guidep.pdf
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
(Choose THREE correct answers.)
A, D, E
Which of the following components are part of FreeIPA? (Choose THREE correct answers.)
B, D, E
Which of the following commands disables the automatic password expiry for the user usera?
C