What is an asymmetric key?

What is an asymmetric key?A . A key used for encryption and decryption that is the sameB . A key used for encryption that is different from the key used for decryptionC . A key used for decryption that is different from the key used for encryptionD . A key...

January 28, 2024 No Comments READ MORE +

Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces?(Choose THREE correct answers.)

Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces?(Choose THREE correct answers.)A . defaultB . systemC . ownerD . trustedE . userView AnswerAnswer:   BDE

January 28, 2024 No Comments READ MORE +

Which of the following statements describes the purpose of ndpmon?

Which of the following statements describes the purpose of ndpmon?A . It monitors the network for neighbor discovery messages from new IPv6 hosts and routers.B . It monitors remote hosts by periodically sending echo requests to them.C . It monitors the availability of a network link by querying network interfaces.D...

January 28, 2024 No Comments READ MORE +

Which tool can be used to manage the Linux Audit system?

Which tool can be used to manage the Linux Audit system?A . auditdB . rkhunterC . chkrootkitD . maldetView AnswerAnswer: A

January 28, 2024 No Comments READ MORE +

Which package management tools can be used to verify the integrity of installed files on a Linux system?

Which package management tools can be used to verify the integrity of installed files on a Linux system?A . RPM and DPKGB . APT and YUMC . dpkg and aptitudeD . yum and zypperView AnswerAnswer: A

January 27, 2024 No Comments READ MORE +

Which of the following expressions are valid AIDE rules?

Which of the following expressions are valid AIDE rules? (Choose TWO correct answers.)A . !/var/run/.*B . append: /var/log/*C . /usr=allD . #/bin/E . /etc p+i+u+gView AnswerAnswer: A E

January 27, 2024 No Comments READ MORE +

Which file is used to configure rkhunter?

Which file is used to configure rkhunter?A . /etc/rkhunter.confB . /etc/audit/auditd.confC . /etc/aide/aide.confD . /etc/maldet.confView AnswerAnswer: A

January 27, 2024 No Comments READ MORE +

Which of the following terms refer to existing scan techniques with nmap?

Which of the following terms refer to existing scan techniques with nmap? (Choose TWO correct answers.)A . Xmas ScanB . Zero ScanC . FIN ScanD . IP ScanE . UDP SYN ScanView AnswerAnswer:   A C

January 26, 2024 No Comments READ MORE +

Determine whether the given solution is correct?

Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.) Solution: newrole Determine whether the given solution is correct?A . CorrectB . IncorrectView AnswerAnswer: A

January 26, 2024 No Comments READ MORE +

Given a proper network and name resolution setup, which of the following commands establishes a trust between a FreeIPA domain and an Active Directory domain?

Given a proper network and name resolution setup, which of the following commands establishes a trust between a FreeIPA domain and an Active Directory domain?A . ipa trust-add --type ad addom --admin Administrator --passwordB . ipa-ad Cadd-trust --account ADDOMAdministrator--query-passwordC . net ad ipajoin addom CU Administrator -pD . trustmanager add...

January 26, 2024 No Comments READ MORE +