What effect does the following command have on TCP packets?
What effect does the following command have on TCP packets? iptables- A INPUT d 10.142.232.1 p tcp --dport 20:21 j ACCEPTA . Forward all TCP traffic not on port 20 or 21 to the IP address 10.142.232.1B . Drop all TCP traffic coming from 10.142.232.1 destined for port 20 or...
Which command is used to view the access control list of a file?
Which command is used to view the access control list of a file?A . lsB . chmodC . getfaclD . setfaclView AnswerAnswer: C
What is the purpose of IP sets?
What is the purpose of IP sets?A . They group together IP addresses that are assigned to the same network interfaces.B . They group together IP addresses and networks that can be referenced by the network routing table.C . They group together IP addresses that can be referenced by netfilter...
Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?
Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?A . subjectAltName = DNS: www.example.org, DNS:example.orgB . extension= SAN: www.example.org, SAN:example.orgC . subjectAltName: www.example.org, subjectAltName: example.orgD . commonName = subjectAltName= www.example.org, subjectAltName =...
Which of the following prefixes could be present in the output of getcifsacl?
Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)A . ACLB . GRANTC . GROUPD . OWNERE . SIDView AnswerAnswer: A C E
What is a buffer overflow?
What is a buffer overflow?A . A type of virusB . A type of malware that disguises itself as legitimate softwareC . A type of denial-of-service attackD . A type of software vulnerabilityView AnswerAnswer: D
Determine whether the given solution is correct?
Which option in an Apache HTTPD configuration file enables OCSP stapling? (Specify ONLY the option name without any values or parameters.) Solution: httpd-ssl.conf Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: B
Determine whether the given solution is correct?
Which PAM module checks new passwords against dictionary words and enforces complexity? (Specially the module name only without any path.) Solution: pam_cracklib Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: A
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?A . getfattrB . setfattrC . getfaclD . setfaclView AnswerAnswer: B
Determine whether the given solution is correct?
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.) Solution: uid=arg Determine whether the given solution is correct?A . CorrectB...