Which of the following are valid OpenVPN authentications modes?
Which of the following are valid OpenVPN authentications modes?
(Choose 2 correct answers)
Which of the following is NOT included in a Snort rule headers?
Which of the following is NOT included in a Snort rule headers?
Which of the following export options, when specified in /etc/exports, will tell the server to use the NFSv4 P
Which of the following export options, when specified in /etc/exports, will tell the server to use the NFSv4 Pseudofilesystem?
Which GPG command us used to create a revocation certificate in case a GPG key ever needs to be called?
Which GPG command us used to create a revocation certificate in case a GPG key ever needs to be called?
An administrator can prevent dictionary based attacks against an OpenSSH server by forcing keybased authentica
An administrator can prevent dictionary based attacks against an OpenSSH server by forcing keybased authentication with which 2 parameters in sshd_config ?
Which statements are true of the following Wireshark capture filter:
Which statements are true of the following Wireshark capture filter:
(tcp[2:2] > 1500 and tcp[2:2] < 1550) or (tcp[4:2] > 1500 and tcp[4:2] < 1550)
(Select 2 correct answers)
With SELinux, what is the command that is used for changing the context of a file?
With SELinux, what is the command that is used for changing the context of a file?
Specify the command only, with no path information or arguments)
What does the following iptables rule accomplish
What does the following iptables rule accomplish:
iptables A INPUT s !127.0.0.0/8 p tcp dport 111 j DROP
What is the purpose of tripwire?
What is the purpose of tripwire?
Which command will make a correct ACL changes to revoke write access for all groups and named users on a file?
You wish to revoke write access for all groups and named users on a file. Which command will make a correct ACL changes?