Which of the following methods can be used to deactivate a rule in Snort?
Which of the following methods can be used to deactivate a rule in Snort?
(Select 2 correct answers)
What does the following iptables rule accomplish
What does the following iptables rule accomplish:
iptables A INPUT d 10.142.232.1 p tcp dport 20:21 j ACCEPT
In Nessus, what does the acronym NASL stand for?
In Nessus, what does the acronym NASL stand for?
What Postfix daemons can be chroot’d by setting the chroot flag in?
Postfix daemons can be chroot’d by setting the chroot flag in _________________.
(supply only the filename, without a path)
DNS servers are vulnerable to which of the following attacks?
DNS servers are vulnerable to which of the following attacks?
(Select 3 correct answers)
What is the default UDP port for OpenVPN traffic?
What is the default UDP port for OpenVPN traffic?
What OpenSSL command will generate a selfsigned test certificate?
What OpenSSL command will generate a selfsigned test certificate?
Which of the following tools could be used to create a OCFS2 cluster filesystem?
Which of the following tools could be used to create a OCFS2 cluster filesystem?
(Select TWO correct answers)
which HAProxy directive is required in the following declaration?
In order to have all requests matching the ACL acl_static_content directed to the servers defined in server_pool, which HAProxy directive is required in the following declaration? (Specify ONLY the missing directive)
______ server_pool if acl_static_content
Which one of the following statements is true about the above output?
The xm list command has returned:
Name ID Mem VCPUs State Time(s)
Domain00 384 1 r 498.7 Debian 2 305 1 p 783.5
Slack 664 1 b 313.6
Centos 7 512 2 r 455.1
Which one of the following statements is true about the above output?