which of the following files can be used to turn on and off network services running on a host?
Depending on the host’s configuration, which of the following files can be used to turn on and off
network services running on a host? (Choose TWO correct answers.)
How do shadow passwords improve the password security in comparison to standard passwd passwords?
How do shadow passwords improve the password security in comparison to standard passwd
passwords?
What is true regarding public and private SSH keys?
What is true regarding public and private SSH keys? (Choose TWO correct answers.)
Which command is used to add OpenSSH private keys to a running ssh-agent instance?
CORRECT TEXT
Which command is used to add OpenSSH private keys to a running ssh-agent instance? (Specify
the file name only without any path.)
Which of the following commands gets the GnuPG public key with the id 63B4835B from the keyserver example.com?
Which of the following commands gets the GnuPG public key with the id 63B4835B from the
keyserver example.com?
Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP
addresses on the internal interface of the firewall to be translated to one public IP address on the
external interface of the same firewall. Which of the following should Sara configure?
Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP
addresses on the internal interface of the firewall to be translated to one public IP address on the
external interface of the same firewall. Which of the following should Sara configure?
Which of the following devices is MOST likely being used when processing the following?
Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY
Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external
party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is
the reason the ABC company’s security administrator is unable to determine the origin of the
attack?
Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external
party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is
the reason the ABC company’s security administrator is unable to determine the origin of the
attack?