Free 212-77 Exam Braindumps (page: 4)

Page 3 of 13

Which of the following are risks of SUID and SGID programs? (Choose two)

  1. Bugs in the programs may cause more damage than they would in ordinary programs.
  2. The program files are large and thus may cause a disk to run out of space.
  3. Because the programs require password entry, running them over an insecure network link runs the risk of password interception.
  4. Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible.

Answer(s): B,D



You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information?

  1. mansyslog 3
  2. man 3syslog
  3. mansyslog -3
  4. man -3syslog

Answer(s): B



Which statement describes the cron daemon?

  1. Manages scheduling of routine system tasks
  2. Manages all incoming connections and spawns off child processes
  3. Is responsible for file sharing across a network
  4. Keeps track of system messages and errors
  5. Manages the printing subsystem

Answer(s): B



You're using a communications protocol that cannot handle encrypted passwords.
You need to disable the Shadow Password Suite.
Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?

  1. grpunconv; passunconv
  2. grpunconv; pwunconv
  3. gconv; passunconv
  4. gconv; pwunconv

Answer(s): B






Post your Comments and Discuss EC-Council 212-77 exam with other Community members:

212-77 Discussions & Posts