Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?
Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?A . --mlockB . --no-swapC . --root-swapD . --keys-no-swapView AnswerAnswer: A
Determine whether the given solution is correct?
Which command included in the Linux Audit system provides searching and filtering of the audit log? (Specify ONLY the command without any path or parameters.) Solution: ausearch Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: A
What is the purpose of an extended attribute in Linux?
What is the purpose of an extended attribute in Linux?A . To store additional metadata about a fileB . To encrypt a file for secure transmissionC . To compress a file to save disk spaceD . To mark a file as executableView AnswerAnswer: A
What is the purpose of TSIG in DNS?
What is the purpose of TSIG in DNS?A . To encrypt DNS queriesB . To sign DNS messages for secure communicationC . To provide information about DNS serversD . To map a domain name to an IP addressView AnswerAnswer: B
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?A . An attack that targets a specific user or organizationB . An attack that aims to steal sensitive informationC . An attack that intercepts communications between two parties to steal informationD . An attack that floods a network or server with traffic to make it...
Which of the following command lines sets the administrator password for ntop to testing 123?
Which of the following command lines sets the administrator password for ntop to testing 123?A . ntop --set-admin-password=testing123B . ntop --set-password=testing123C . ntop --reset-password=testing123D . ntop --set-new-password=testing123View AnswerAnswer: A
Which of the following is an example of a behavioral-based HID technique?
Which of the following is an example of a behavioral-based HID technique?A . Signature-based detectionB . Anomaly-based detectionC . Heuristic-based detectionD . Rule-based detectionView AnswerAnswer: B
Which of the following is used to perform DNSSEC validation on behalf of clients?
Which of the following is used to perform DNSSEC validation on behalf of clients?A . Recursive name serverB . Authoritative name serverC . Secondary name serverD . Primary name serverView AnswerAnswer: A
What is a honeypot?
What is a honeypot?A . A type of virusB . A network security tool designed to lure attackers into a trapC . A type of phishing scamD . A type of denial-of-service attackView AnswerAnswer: B
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?(Choose THREE correct answers).
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?(Choose THREE correct answers).A . hostB . shadowC . serviceD . passwdE . groupView AnswerAnswer: B D E