Which of the following are common techniques for securing Nagios?
Which of the following are common techniques for securing Nagios? (Select THREE correct answers)
Which of the following ist an iptables rule set?
Which of the following ist an iptables rule set?
Which of the following are builtin chains for the iptables nat table?
Which of the following are builtin chains for the iptables nat table? (Select THREE correct answers)
Which syslog configuration line will send out logged messages to a remote syslog server?
Which syslog configuration line will send out logged messages to a remote syslog server?
Which option is required to syslogd in order for it to accept remote log messages?
Which option is required to syslogd in order for it to accept remote log messages?
What does the following iptables rule accomplish: <code> iptables A INPUT s 208.77.188.166 j DROP </c
What does the following iptables rule accomplish:
<code>
iptables A INPUT s 208.77.188.166 j DROP
</code>
What does the following iptables rule accomplish: <code> iptables A INPUT s 208.77.188.166 d 10.142.232.
What does the following iptables rule accomplish:
<code>
iptables A INPUT s 208.77.188.166 d 10.142.232.1 p tcp dport 22 j ACCEPT
</code>
What does the following iptables rule accomplish: <code> iptables A INPUT d 10.142.232.1 p tcp dport 20:
What does the following iptables rule accomplish:
<code>
iptables A INPUT d 10.142.232.1 p tcp dport 20:21 j ACCEPT
</code>
What does the following iptables rule accomplish: <code> iptables A INPUT s !127.0.0.0/8 p tcp dport 111
What does the following iptables rule accomplish:
<code>
iptables A INPUT s !127.0.0.0/8 p tcp dport 111 j DROP
</code>
What is wrong with the following configuration?
The local system administrator has created a configuration entry for apache version 2 that isn’t
working. What is wrong with the following configuration?
<code>
<Location /members>
AuthName Members
AuthType Basic
AuthUserFile /www/passwd
</Location>
</code>