Which of the following methods can be used to deactivate a rule in Snort?
Which of the following methods can be used to deactivate a rule in Snort? (Select TWO correct
answers)
Which line should be added to smb.conf to avoid UID and GID inconsistencies across servers over SMB?
Which line should be added to smb.conf to avoid UID and GID inconsistencies across servers over
SMB?
Which of the following steps should be followed to fix the problem?
When using the auth_ldap module with APACHE 1.3, the log displays several messages containing
“protocol error”. Which of the following steps should be followed to fix the problem?
Which resource type should be created?
An administrator wants to create a resource that can be ported to Red Hat Cluster Suite from a
Pacemaker environment. Which resource type should be created?
What command will commit the file to RCS revision control AND keep a local, unlocked copy of the latest versio
The system administrator is keeping local configuration file changes in RCS. What command will
commit the file to RCS revision control AND keep a local, unlocked copy of the latest version of the
file?
what must be configured (in the Samba configuration file) to allow access?
CORRECT TEXT
An anonymous user had her access denied while she was trying to access the share called
reports on a Samba Server using the smbclient command. Assuming that it is necessary for
anonymous users to access that share, what must be configured (in the Samba configuration file)
to allow access? (Please specify the full directive and value).
which parameter must match the binddn parameter of the master server?
In an LDAP slave’s slapd.conf configuration file, which parameter must match the binddn parameter
of the master server?
Which CPU flag must be enabled for full virtualization in Xen with AMD processors?
Which CPU flag must be enabled for full virtualization in Xen with AMD processors?
What command can be used to compare the configuration file with the latest committed version?
There is a configuration file being managed by RCS. Based on timestamps, it appears that someone
has modified the file without checking it into RCS. What command can be used to compare the
configuration file with the latest committed version? (Specify the command only, path or argument information)
What must be done to allow only users of the devel system group to access a share?
What must be done to allow only users of the devel system group to access a share?