Which of the following access control models is established by using SELinux?
Which of the following access control models is established by using SELinux?A . Security Access Control (SAC)B . Group Access Control (GAC)C . User Access Control (UAC)D . Discretionary Access Control (DAC)E . Mandatory Access Control (MAC)View AnswerAnswer: E
Which command revokes ACL-based write access for groups and named users on the file afile?
Which command revokes ACL-based write access for groups and named users on the file afile?A . setfacl Cx group: * : rx, user:*: rx afileB . setfacl Cx mask: : rx afileC . setfacl ~m mask: : rx afileD . setfacl ~m group: * : rx, user :*: rx afileView...
Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?
Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?A . -tlsnameB . -servernameC . -sninameD . -vhostE . -hostView AnswerAnswer: B
What is a symmetric key?
What is a symmetric key?A . A key used for encryption and decryption that is the sameB . A key used for encryption that is different from the key used for decryptionC . A key used for decryption that is different from the key used for encryptionD . A key...
Which of the following commands adds a new user usera to FreeIPA?
Which of the following commands adds a new user usera to FreeIPA?A . useradd usera --directory ipa --gecos “User A”B . idap- useradd CH Idaps://ipa-server CN=UserA --attribs “Firstname: User: Lastname: A”C . ipa-admin create user --account usera C-fname User --iname AD . ipa user-add usera --first User --last AE ....
What is the purpose of NSEC3 in DNSSEC?
What is the purpose of NSEC3 in DNSSEC?A . To provide information about DNSSEC key signing keysB . To prevent zone enumerationC . To authenticate a DNS serverD . To sign a DNS zoneView AnswerAnswer: B
Which file is used to configure AIDE?
Which file is used to configure AIDE?A . /etc/rkhunter.confB . /etc/audit/auditd.confC . /etc/aide/aide.confD . /etc/maldet.confView AnswerAnswer: C
Which of the following practices are important for the security of private keys?
Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)A . Private keys should be created on the systems where they will be used and should never leave them.B . Private keys should be uploaded to public key servers.C . Private keys should...
What is the difference between a SetUID and SetGID bit?
What is the difference between a SetUID and SetGID bit?A . SetUID applies to files, while SetGID applies to directoriesB . SetUID allows a file to be executed with the permissions of the file owner, while SetGID allows a file to be executed with the permissions of the group ownerC...
What is privilege escalation?
What is privilege escalation?A . An attack that targets a specific user or organizationB . An attack that aims to steal sensitive informationC . An attack that exploits a vulnerability to gain elevated privilegesD . An attack that floods a network or server with traffic to make it unavailableView AnswerAnswer:...