What command is used to create an ISO9660 filesystem that can be properly accessed from a Windows 95/98 machin
What command is used to create an ISO9660 filesystem that can be properly accessed from a Windows 95/98 machine?
What security precautions must be taken when creating a directory into which files can be uploaded anonymously
What security precautions must be taken when creating a directory into which files can be uploaded anonymously using
FTP?
How should the corresponding configuration entry be formated?
An SELinux security context is required to ensure that all files in /opt have the default context of system_u:object_r:usr_t.
How should the corresponding configuration entry be formated?
mount multiple shares without supplying further credentials after the first successful authentication.
When ________-level security is used, the client will be able to mount multiple shares without supplying further credentials after the first successful authentication.
Which Squid configuration directive defines the authentication method to use?
Which Squid configuration directive defines the authentication method to use?
Which of the following organisations track and report on security related flaws in computer technology?
Which of the following organisations track and report on security related flaws in computer technology? (Please select TWO answers)
What should you do when you discover that you can connect to one of the machines on the network via port 23.
While checking your security, you discover that you can connect to one of the machines on the network via port 23.
What should you do to the network service on this machine?
When attempting to send a file to another user securely with GPG, which of the following actions must be done?
When attempting to send a file to another user securely with GPG, which of the following actions must be done?
Which command will create a complete report which you can analyze for changes which may be security related?
After a minor security incident you are instructed by your lead sys-admin to verify the RPM’s installed on a running system.
Which command will create a complete report which you can analyze for changes which may be security related?
Which one of the following services can be run as a non-root user?
To increase system security, it is often desirable to run daemons for system services with nonroot user ids. Which one of the following services can be run as a non-root user?