Which directive in a Nginx server configuration block defines the TCP ports on which the virtual host will be available, and which protocols it will use?
CORRECT TEXT Which directive in a Nginx server configuration block defines the TCP ports on which the virtual host will be available, and which protocols it will use? (Specify ONLY the option name without any values.)View AnswerAnswer: listen
According to this LDIF excerpt, which organizational unit is Robert Smith part of?
CORRECT TEXT According to this LDIF excerpt, which organizational unit is Robert Smith part of? (Specify only the organizational unit.) View AnswerAnswer: people
What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests?
What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests?A . NetMapB . OpenVASC . SmartscanD . WiresharkView AnswerAnswer: B
Which tool creates a Certificate Signing Request (CSR) for serving HTTPS with Apache HTTPD?
Which tool creates a Certificate Signing Request (CSR) for serving HTTPS with Apache HTTPD?A . apachect1B . certgenC . cartoolD . httpsgenE . opensslView AnswerAnswer: E
Given that all these files were correctly processed by the web server processes, which of the following statements is true about requests to the directory?
In order to protect a directory on an Apache HTTPD web server with a password, this configuration was added to an .htaccess file in the respective directory: Furthermore, a file /var/www/dir/ .htpasswd was created with the following content: usera:S3cr3t Given that all these files were correctly processed by the web...
The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?
The content of which local file has to be transmitted to a remote SSH server in order to be able to log into the remote server using SSH keys?A . ~/.ssh/authorized_keysB . ~/.ssh/configC . ~/.ssh/id_rsa.pubD . ~/.ssh/id_rsaE . ~./ssh/known_hostsView AnswerAnswer: A
What is DNSSEC used for?
What is DNSSEC used for?A . Encrypted DNS queries between nameserversB . Cryptographic authentication of DNS zonesC . Secondary DNS queries for local zonesD . Authentication of the user that initiated the DNS queryE . Encrypting DNS queries and answersView AnswerAnswer: B
Which http_access directive for Squid allows users in the ACL named sales_net to only access the Internet at times specified in the time_acl named sales_time?
Which http_access directive for Squid allows users in the ACL named sales_net to only access the Internet at times specified in the time_acl named sales_time?A . http_access deny sales_time sales_netB . http_access allow sales_net sales_timeC . http_access allow sales_net and sales-timeD . allow http_access sales_net sales_timeE . http_access sales_net sales_timeView...
How is the LDAP administrator account configured when the rootdn and rootpw directives are not present in the slapd.conf file?
How is the LDAP administrator account configured when the rootdn and rootpw directives are not present in the slapd.conf file?A . The default account admin with the password admin are usedB . The account is defined by an ACL in slapd.confC . The default account admin is used without a...
Which of the following lines in the sshd configuration file should, if present, be changed in order to increase the security of the server? (Choose two.)
Which of the following lines in the sshd configuration file should, if present, be changed in order to increase the security of the server? (Choose two.)A . Protocol 2, 1B . PermitEmptyPasswords noC . Port 22D . PermitRootLogin yesE . IgnoreRhosts yesView AnswerAnswer: A,D