New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 3 Question 6 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 6
Topic #: 3
[All GSNA Questions]

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to identify the secure terminals from where the root can be allowed to log in. Which of the following Unix configuration files can you use to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: D

In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.

Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.

Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.

Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each

there has been.


Contribute your Thoughts:

0/2000 characters
Tesha
4 months ago
I didn't know that! Good to learn something new.
upvoted 0 times
...
Kenia
4 months ago
Yup, /etc/securetty is the go-to for secure terminals.
upvoted 0 times
...
Yuette
4 months ago
Wait, are you sure? I thought it was something else.
upvoted 0 times
...
Rashida
4 months ago
Agreed, that's the right file to check!
upvoted 0 times
...
Mitzie
5 months ago
It's definitely /etc/securetty for root login.
upvoted 0 times
...
Mee
5 months ago
I’m leaning towards /etc/securetty too, but I wonder if there are any other files that could affect root login.
upvoted 0 times
...
Janey
5 months ago
I’m a bit confused about this one. I know /etc/services is related to network services, but I can't recall what the others do.
upvoted 0 times
...
Trina
5 months ago
I feel like I've seen a similar question before, and I think /etc/securetty was the right file to configure root login access.
upvoted 0 times
...
Katheryn
5 months ago
I think the answer might be /etc/securetty, but I'm not completely sure. I remember it has something to do with secure terminals.
upvoted 0 times
...
Nakisha
5 months ago
Wait, what's the difference between current logging details and data source inventory? I'm a little confused on that part. I'll have to review my notes to make sure I understand.
upvoted 0 times
...
Lashawna
5 months ago
Key strategy here: read carefully. Level One suggests this is an initial internal review, so an independent review (D) doesn't make sense at this stage.
upvoted 0 times
...
Elenore
5 months ago
I remember discussing how oil prices directly affect operating costs for airlines, so that might be a threat, too.
upvoted 0 times
...
Tomoko
5 months ago
I'm not sure about the specific APIs, but I remember something about using them for communication between layers. Maybe the northbound and southbound APIs?
upvoted 0 times
...

Save Cancel