DRBD is equivalent to a networked version of what RAID level?
DRBD is equivalent to a networked version of what RAID level?
Which GPG command us used to create a revocation certificate in case a GPG key ever needs to be called?
Which GPG command us used to create a revocation certificate in case a GPG key ever needs to be called?
An administrator can prevent dictionary based attacks against an OpenSSH server by forcing keybased authentica
An administrator can prevent dictionary based attacks against an OpenSSH server by forcing keybased authentication with which 2 parameters in sshd_config ?
Which statements are true of the following Wireshark capture filter:
Which statements are true of the following Wireshark capture filter:
(tcp[2:2] > 1500 and tcp[2:2] < 1550) or (tcp[4:2] > 1500 and tcp[4:2] < 1550)
(Select 2 correct answers)
With SELinux, what is the command that is used for changing the context of a file?
With SELinux, what is the command that is used for changing the context of a file?
Specify the command only, with no path information or arguments)
What does the following iptables rule accomplish
What does the following iptables rule accomplish:
iptables A INPUT s !127.0.0.0/8 p tcp dport 111 j DROP
What is the purpose of tripwire?
What is the purpose of tripwire?
Which command will make a correct ACL changes to revoke write access for all groups and named users on a file?
You wish to revoke write access for all groups and named users on a file. Which command will make a correct ACL changes?
Which of the following are common techniques for securing Nagios ?
Which of the following are common techniques for securing Nagios ?
(Select 3 correct answers)
Which of the following are common techniques for securing a sendmail server ?
Which of the following are common techniques for securing a sendmail server ?
(Select 3 correct answers)