Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 5 Question 41 Discussion

Actual exam question for GIAC's GIAC Systems and Network Auditor exam
Question #: 41
Topic #: 5
[All GIAC Systems and Network Auditor Questions]

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to identify the secure terminals from where the root can be allowed to log in. Which of the following Unix configuration files can you use to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: D

In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.

Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.

Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.

Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each

there has been.


Contribute your Thoughts:

Tasia
1 days ago
I believe /etc/securetty is the correct answer, as it controls which terminals are allowed for root login.
upvoted 0 times
...
Princess
2 days ago
I'm not sure, but I think /etc/securetty makes sense because it deals with secure terminal access.
upvoted 0 times
...
Pearly
15 days ago
I agree with Candra, /etc/securetty is used to specify secure terminals for root login.
upvoted 0 times
...
Candra
16 days ago
I think the answer is D) /etc/securetty.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77