Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?

Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?A . --mlockB . --no-swapC . --root-swapD . --keys-no-swapView AnswerAnswer: A

February 2, 2024 No Comments READ MORE +

Determine whether the given solution is correct?

Which command included in the Linux Audit system provides searching and filtering of the audit log? (Specify ONLY the command without any path or parameters.) Solution: ausearch Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: A

February 2, 2024 No Comments READ MORE +

What is the purpose of an extended attribute in Linux?

What is the purpose of an extended attribute in Linux?A . To store additional metadata about a fileB . To encrypt a file for secure transmissionC . To compress a file to save disk spaceD . To mark a file as executableView AnswerAnswer: A

January 31, 2024 No Comments READ MORE +

What is the purpose of TSIG in DNS?

What is the purpose of TSIG in DNS?A . To encrypt DNS queriesB . To sign DNS messages for secure communicationC . To provide information about DNS serversD . To map a domain name to an IP addressView AnswerAnswer: B

January 31, 2024 No Comments READ MORE +

What is a man-in-the-middle attack?

What is a man-in-the-middle attack?A . An attack that targets a specific user or organizationB . An attack that aims to steal sensitive informationC . An attack that intercepts communications between two parties to steal informationD . An attack that floods a network or server with traffic to make it...

January 30, 2024 No Comments READ MORE +

Which of the following command lines sets the administrator password for ntop to testing 123?

Which of the following command lines sets the administrator password for ntop to testing 123?A . ntop --set-admin-password=testing123B . ntop --set-password=testing123C . ntop --reset-password=testing123D . ntop --set-new-password=testing123View AnswerAnswer: A

January 30, 2024 No Comments READ MORE +

Which of the following is an example of a behavioral-based HID technique?

Which of the following is an example of a behavioral-based HID technique?A . Signature-based detectionB . Anomaly-based detectionC . Heuristic-based detectionD . Rule-based detectionView AnswerAnswer: B

January 30, 2024 No Comments READ MORE +

Which of the following is used to perform DNSSEC validation on behalf of clients?

Which of the following is used to perform DNSSEC validation on behalf of clients?A . Recursive name serverB . Authoritative name serverC . Secondary name serverD . Primary name serverView AnswerAnswer: A

January 30, 2024 No Comments READ MORE +

What is a honeypot?

What is a honeypot?A . A type of virusB . A network security tool designed to lure attackers into a trapC . A type of phishing scamD . A type of denial-of-service attackView AnswerAnswer: B

January 29, 2024 No Comments READ MORE +

Which of the following database names can be used within a Name Service Switch (NSS) configuration file?(Choose THREE correct answers).

Which of the following database names can be used within a Name Service Switch (NSS) configuration file?(Choose THREE correct answers).A . hostB . shadowC . serviceD . passwdE . groupView AnswerAnswer: B D E

January 28, 2024 No Comments READ MORE +