Which of the following access control models is established by using SELinux?

Which of the following access control models is established by using SELinux?A . Security Access Control (SAC)B . Group Access Control (GAC)C . User Access Control (UAC)D . Discretionary Access Control (DAC)E . Mandatory Access Control (MAC)View AnswerAnswer: E

February 7, 2024 No Comments READ MORE +

Which command revokes ACL-based write access for groups and named users on the file afile?

Which command revokes ACL-based write access for groups and named users on the file afile?A . setfacl Cx group: * : rx, user:*: rx afileB . setfacl Cx mask: : rx afileC . setfacl ~m mask: : rx afileD . setfacl ~m group: * : rx, user :*: rx afileView...

February 6, 2024 No Comments READ MORE +

Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?

Which of the following parameters to openssl s_client specifies the host name to use for TLS Server Name Indication?A . -tlsnameB . -servernameC . -sninameD . -vhostE . -hostView AnswerAnswer: B

February 6, 2024 No Comments READ MORE +

What is a symmetric key?

What is a symmetric key?A . A key used for encryption and decryption that is the sameB . A key used for encryption that is different from the key used for decryptionC . A key used for decryption that is different from the key used for encryptionD . A key...

February 5, 2024 No Comments READ MORE +

Which of the following commands adds a new user usera to FreeIPA?

Which of the following commands adds a new user usera to FreeIPA?A . useradd usera --directory ipa --gecos “User A”B . idap- useradd CH Idaps://ipa-server CN=UserA --attribs “Firstname: User: Lastname: A”C . ipa-admin create user --account usera C-fname User --iname AD . ipa user-add usera --first User --last AE ....

February 5, 2024 No Comments READ MORE +

What is the purpose of NSEC3 in DNSSEC?

What is the purpose of NSEC3 in DNSSEC?A . To provide information about DNSSEC key signing keysB . To prevent zone enumerationC . To authenticate a DNS serverD . To sign a DNS zoneView AnswerAnswer: B

February 4, 2024 No Comments READ MORE +

Which file is used to configure AIDE?

Which file is used to configure AIDE?A . /etc/rkhunter.confB . /etc/audit/auditd.confC . /etc/aide/aide.confD . /etc/maldet.confView AnswerAnswer: C

February 4, 2024 No Comments READ MORE +

Which of the following practices are important for the security of private keys?

Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)A . Private keys should be created on the systems where they will be used and should never leave them.B . Private keys should be uploaded to public key servers.C . Private keys should...

February 3, 2024 No Comments READ MORE +

What is the difference between a SetUID and SetGID bit?

What is the difference between a SetUID and SetGID bit?A . SetUID applies to files, while SetGID applies to directoriesB . SetUID allows a file to be executed with the permissions of the file owner, while SetGID allows a file to be executed with the permissions of the group ownerC...

February 3, 2024 No Comments READ MORE +

What is privilege escalation?

What is privilege escalation?A . An attack that targets a specific user or organizationB . An attack that aims to steal sensitive informationC . An attack that exploits a vulnerability to gain elevated privilegesD . An attack that floods a network or server with traffic to make it unavailableView AnswerAnswer:...

February 2, 2024 No Comments READ MORE +