Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil E-Commerce Architect 212-77 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 212-77 Premium Access

View all detail and faqs for the 212-77 exam


370 Students Passed

85% Average Score

94% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following types of information is returned by typing ifconfig eth0?

(Choose two)

Options:

A.

The names of programs that are using eth0

B.

The IP address assigned to eth0

C.

The hardware address of eth0

D.

The hostname associated with eth0

Questions # 2:

One of your colleagues is showing you the output from a protocol analyzer, which can detect the types of messages that are being transmitted over a network. The protocol analyzer shows a large number of ping commands being sent to your Web server. Others on the Internet are having trouble accessing your Web server. What kind of problem are you having?

Options:

A.

Someone is using your Web site to test their connectivity to the Internet.

B.

Someone is using a DoS attack on your Web site.

C.

There is no problem; this is normal traffic from DNS servers and Internet routers checking connectivity to your Web site.

D.

There is insufficient capacity on the Internet connection to your Web site.

Questions # 3:

Which of the following commands configures the laura account to expire on

January 1, 2005?

Options:

A.

chage -E 2005/01/01 laura

B.

usermod -e 2005 laura

C.

usermod -e 2005-01-01 laura

D.

chage -I 2005-01-01 laura

Questions # 4:

Which of the following configuration options for kernel enable you to effectively make your computer a router?

Options:

A.

CONFIG_FIREWALL

B.

CONFIG_IP_FIREWALL

C.

CONFIG_SYN_COOKIES

D.

CONFIG_IP_FORWARD

Questions # 5:

On Linux systems, how can root logins be restricted?

Options:

A.

With the /etc/default/login file

B.

With the /etc/default/useradd file

C.

With the .profile file

D.

With the /etc/securetty file

Questions # 6:

You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?

Options:

A.

end

B.

CTRL-ALT-DEL

C.

stop

D.

wait

E.

kill

Questions # 7:

You're using a communications protocol that cannot handle encrypted passwords.

You need to disable the Shadow Password Suite. Which of the following pairs of commands restores the original clear-text passwords that you had encrypted into the /etc/shadow and /etc/gshadow files?

Options:

A.

grpunconv; passunconv

B.

grpunconv; pwunconv

C.

gconv; passunconv

D.

gconv; pwunconv

Questions # 8:

Which of the following steps would not substantially improve security over the typical Linux installation to a computer with typical hardware and settings?

Options:

A.

Set a BIOS password.

B.

Remove servers that were installed by default but that are not being used.

C.

Set the computer to boot from a CD-ROM before a floppy.

D.

Lock the computer case shut.

Questions # 9:

Which of the following lines would log all messages from news to the file /var/log/newslog?

Options:

A.

news.* /var/log/newslog

B.

news.!* /var/log/newslog

C.

news.*;news.!=info /var/log/newslog

D.

*news /var/log/newslog

Questions # 10:

Your supervisor tells you that she wants a crime database program, /opt/bin/anticrime run at the highest priority. From the ps aux | grep anticrime command, you find that anticrime is currently being run by user jb (your supervisor), with a PID of 1539. Which of the following commands gives the currently running anticrime program a higher priority on your system?

Options:

A.

nice -n -10 anticrime

B.

renice -10 1539

C.

renice 10 1539

D.

nice -n 10 anticrime

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.