What is one of the primary claimed benefits of Smack over SELinux?
What is one of the primary claimed benefits of Smack over SELinux?
How does AppArmor configure its access control settings?
How does AppArmor configure its access control settings?
Which of the following is NOT and valid scan technique with nmap?
Which of the following is NOT and valid scan technique with nmap?
(Supply only the filename, without a path)
CORRECT TEXT
Postfix daemons can be chroot’d by setting the chroot flag in ____________. (Supply only the
filename, without a path)
What can proxymap be used for in a Postfix installation?
What can proxymap be used for in a Postfix installation? (Select TWO correct answers)
Which of the following parameters should be set in main.cf to enable TLS in Postfix?
Which of the following parameters should be set in main.cf to enable TLS in Postfix?
What command can be used to list any cracked passwords for this file?
The system administrator wishes to use John the Ripper to confirm that the passwords in a file
called passwords are not weak. john has finished but the terminal window running the program
has closed. What command can be used to list any cracked passwords for this file?
What line in the /etc/pam.d/su file will allow root to use su without supplying passwords?
On a new Linux system, the root user is being asked to provide the root user password before
being able to use the su command. What line in the /etc/pam.d/su file will allow root to use su
without supplying passwords?
Which line will configure this behaviour?
The system administrator wishes to use the pam_listfile.so module to restrict which users are
allowed to login via SSH. Which line will configure this behaviour?
Which of the following is NOT included in a Snort rule header?
Which of the following is NOT included in a Snort rule header?