What effect does the following command have on TCP packets?

What effect does the following command have on TCP packets? iptables- A INPUT d 10.142.232.1 p tcp --dport 20:21 j ACCEPTA . Forward all TCP traffic not on port 20 or 21 to the IP address 10.142.232.1B . Drop all TCP traffic coming from 10.142.232.1 destined for port 20 or...

January 26, 2024 No Comments READ MORE +

Which command is used to view the access control list of a file?

Which command is used to view the access control list of a file?A . lsB . chmodC . getfaclD . setfaclView AnswerAnswer: C

January 26, 2024 No Comments READ MORE +

What is the purpose of IP sets?

What is the purpose of IP sets?A . They group together IP addresses that are assigned to the same network interfaces.B . They group together IP addresses and networks that can be referenced by the network routing table.C . They group together IP addresses that can be referenced by netfilter...

January 24, 2024 No Comments READ MORE +

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate?A . subjectAltName = DNS: www.example.org, DNS:example.orgB . extension= SAN: www.example.org, SAN:example.orgC . subjectAltName: www.example.org, subjectAltName: example.orgD . commonName = subjectAltName= www.example.org, subjectAltName =...

January 24, 2024 No Comments READ MORE +

Which of the following prefixes could be present in the output of getcifsacl?

Which of the following prefixes could be present in the output of getcifsacl? (Choose THREE correct answers.)A . ACLB . GRANTC . GROUPD . OWNERE . SIDView AnswerAnswer: A C E

January 24, 2024 No Comments READ MORE +

What is a buffer overflow?

What is a buffer overflow?A . A type of virusB . A type of malware that disguises itself as legitimate softwareC . A type of denial-of-service attackD . A type of software vulnerabilityView AnswerAnswer: D

January 24, 2024 No Comments READ MORE +

Determine whether the given solution is correct?

Which option in an Apache HTTPD configuration file enables OCSP stapling? (Specify ONLY the option name without any values or parameters.) Solution: httpd-ssl.conf Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: B

January 24, 2024 No Comments READ MORE +

Determine whether the given solution is correct?

Which PAM module checks new passwords against dictionary words and enforces complexity? (Specially the module name only without any path.) Solution: pam_cracklib Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: A

January 23, 2024 No Comments READ MORE +

Which command is used to set an extended attribute on a file in Linux?

Which command is used to set an extended attribute on a file in Linux?A . getfattrB . setfattrC . getfaclD . setfaclView AnswerAnswer: B

January 23, 2024 No Comments READ MORE +

Determine whether the given solution is correct?

What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.) Solution: uid=arg Determine whether the given solution is correct?A . CorrectB...

January 23, 2024 No Comments READ MORE +