Which of the following are valid deployment scenarios?
Which of the following are valid deployment scenarios?
(Select 3 correct answers)
What configuration file has the administrator forgotten to edit ?
An administrator has successfully configured a cryptographic volume for dmcrypt, and added the following line to /etc/fstab:
/dev/mapper/cryptvol /media/crypt auto defaults 0 0
Upon booting the system, the error message "mount: special device /dev/mapper/cryptvol does not exist" is displayed. What configuration file has the administrator forgotten to edit ?
(Provide the full path and filename)
which must be followed to enable serverwide zone transfers between two BIND 9 servers securely using TSIG?
What are the steps which must be followed to enable serverwide zone transfers between two BIND 9 servers securely using TSIG?
What command will list basic information about all targets avaiable to cryptmount?
What command will list basic information about all targets avaiable to cryptmount?
(Provide the command with any options or parameters)
Where is the global list of known SSH host keys located ?
Where is the global list of known SSH host keys located ?
(Supply the full path and filename)
What is the purpose of this directive?
The apache administrator has added the following lines to the configuration files:
<Directory />
AllowOverride None
</Directory>
What is the purpose of this directive?
Which of the following can be done to secure BIND server?
Which of the following can be done to secure BIND server?
(Select 3 correct answers)
What OpenSSL command will generate a certificate signing request (CSR) using the private key file privkey.pem?
What OpenSSL command will generate a certificate signing request (CSR) using the private key file privkey.pem?
What line in the /etc/pam.d/su file will allow root to use su without supplying passwords?
On a new Linux system, the root user is being asked to provide the root user password before being able to use the su command. What line in the /etc/pam.d/su file will allow root to use su without supplying passwords?
How should the corresponding configuration entry be formated?
An SELinux security context is required to ensure that all files in /opt have the default context of system_u:object_r:usr_t.
How should the corresponding configuration entry be formated?