Podcast
Questions and Answers
What is the purpose of the uid
option in the mount.cifs
command?
What is the purpose of the uid
option in the mount.cifs
command?
- To set the mount point
- To specify the server IP address
- To set the file system type
- To specify the user that appears as the local owner of the files (correct)
Which of the following is a good practice for private key security?
Which of the following is a good practice for private key security?
- Creating private keys on the systems where they will be used (correct)
- Storing private keys as plain text files
- Uploading private keys to public key servers
- Sharing private keys with others
What is the main purpose of NSEC3 in DNSSEC?
What is the main purpose of NSEC3 in DNSSEC?
- To prevent zone enumeration (correct)
- To sign a DNS zone
- To authenticate a DNS server
- To provide information about DNSSEC key signing keys
What is the command used to change the SELinux context for a user?
What is the command used to change the SELinux context for a user?
Which file is used to configure the AIDE system?
Which file is used to configure the AIDE system?
What is the purpose of the ndpmon
command?
What is the purpose of the ndpmon
command?
Which of the following is a good practice for private key security?
Which of the following is a good practice for private key security?
What is the purpose of the mount.cifs
command?
What is the purpose of the mount.cifs
command?
What is the purpose of rkhunter?
What is the purpose of rkhunter?
Which command is used to view the access control list of a file?
Which command is used to view the access control list of a file?
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?
Which permission bit allows a user to delete a file?
Which permission bit allows a user to delete a file?
What is the purpose of a Certificate Authority (CA)?
What is the purpose of a Certificate Authority (CA)?
Which command adds users using SSSD’s local service?
Which command adds users using SSSD’s local service?
Which DNS records are used in DNSSEC?
Which DNS records are used in DNSSEC?
Which of the following terms refer to existing scan techniques with nmap?
Which of the following terms refer to existing scan techniques with nmap?
Which command changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Which command changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Which of the following methods can be used to deactivate a rule in Snort?
Which of the following methods can be used to deactivate a rule in Snort?
What is the primary function of the tool that reads syslog files containing Snort information?
What is the primary function of the tool that reads syslog files containing Snort information?
Which command is used to delete the first key from a LUKS device?
Which command is used to delete the first key from a LUKS device?
What is a characteristic of eCryptfs?
What is a characteristic of eCryptfs?
How does TSIG authenticate name servers for secured zone transfers?
How does TSIG authenticate name servers for secured zone transfers?
Which of the following is NOT a component of FreeIPA?
Which of the following is NOT a component of FreeIPA?
What is the purpose of the dnssec-keygen utility?
What is the purpose of the dnssec-keygen utility?
What type of system is a Security Information and Event Management (SIEM) system?
What type of system is a Security Information and Event Management (SIEM) system?
What information is contained in an X509 certificate?
What information is contained in an X509 certificate?
What command is used to make the contents of an eCryptfs encrypted directory available to the user?
What command is used to make the contents of an eCryptfs encrypted directory available to the user?
What is the purpose of the chage command?
What is the purpose of the chage command?
What does a network link monitor do?
What does a network link monitor do?
What is an asymmetric key used for?
What is an asymmetric key used for?
What is an example of a behavioral-based HID technique?
What is an example of a behavioral-based HID technique?
What command revokes ACL-based write access for groups and named users on a file?
What command revokes ACL-based write access for groups and named users on a file?
What is the purpose of the setfattr command?
What is the purpose of the setfattr command?
What is a buffer overflow?
What is a buffer overflow?
What tool can be used to manage the Linux Audit system?
What tool can be used to manage the Linux Audit system?
What is the main difference between a DNSSEC-signed zone and a non-DNSSEC-signed zone?
What is the main difference between a DNSSEC-signed zone and a non-DNSSEC-signed zone?
What is the difference between a SetUID and SetGID bit?
What is the difference between a SetUID and SetGID bit?
What is a honeypot?
What is a honeypot?
What is the primary purpose of a Certificate Revocation List (CRL)?
What is the primary purpose of a Certificate Revocation List (CRL)?
What package management tools can be used to verify the integrity of installed files on a Linux system?
What package management tools can be used to verify the integrity of installed files on a Linux system?
What is the main benefit of using AppArmor over SELinux?
What is the main benefit of using AppArmor over SELinux?
What is the primary purpose of a DNSKEY record in DNSSEC?
What is the primary purpose of a DNSKEY record in DNSSEC?
What is the main difference between a chroot environment and a regular environment?
What is the main difference between a chroot environment and a regular environment?
What is the primary purpose of AIDE?
What is the primary purpose of AIDE?
What is phishing?
What is phishing?
What is the primary purpose of DNS over TLS and DNS over HTTPS?
What is the primary purpose of DNS over TLS and DNS over HTTPS?
What is the main difference between AppArmor and SELinux?
What is the main difference between AppArmor and SELinux?
What is the primary purpose of an X.509 certificate?
What is the primary purpose of an X.509 certificate?
What is the purpose of the Linux Audit system?
What is the purpose of the Linux Audit system?
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
What is a Trojan?
What is a Trojan?
What is the purpose of a trust anchor?
What is the purpose of a trust anchor?
Which of the following is used to issue and sign X.509 certificates?
Which of the following is used to issue and sign X.509 certificates?
What is the purpose of the command dnssec-keygen?
What is the purpose of the command dnssec-keygen?
What is a rogue access point?
What is a rogue access point?
What is the purpose of the push directive in an OpenVPN server configuration?
What is the purpose of the push directive in an OpenVPN server configuration?
What is Linux Malware Detect?
What is Linux Malware Detect?
What is a DoS attack?
What is a DoS attack?
What is the primary purpose of a honey pot in network security?
What is the primary purpose of a honey pot in network security?
Which type of DNS server is responsible for performing DNSSEC validation on behalf of clients?
Which type of DNS server is responsible for performing DNSSEC validation on behalf of clients?
What is the purpose of the ipa trust-add command in FreeIPA?
What is the purpose of the ipa trust-add command in FreeIPA?
What is the purpose of the ntop command with the --set-admin-password option?
What is the purpose of the ntop command with the --set-admin-password option?
What is a symmetric key in cryptography?
What is a symmetric key in cryptography?
What is the purpose of the pam_cracklib PAM module?
What is the purpose of the pam_cracklib PAM module?
What is the purpose of TSIG in DNS?
What is the purpose of TSIG in DNS?
What is the purpose of IP sets in Linux?
What is the purpose of IP sets in Linux?
What is the purpose of an extended attribute in Linux?
What is the purpose of an extended attribute in Linux?
What is the effect of the iptables command with the -A INPUT option?
What is the effect of the iptables command with the -A INPUT option?
What is the purpose of OCSP stapling?
What is the purpose of OCSP stapling?
What is the main purpose of HID?
What is the main purpose of HID?
What is a ciphertext?
What is a ciphertext?
What is the command to install and configure a new FreeIPA server?
What is the command to install and configure a new FreeIPA server?
What is Cryptography?
What is Cryptography?
What is the purpose of the ebtables command?
What is the purpose of the ebtables command?
What is a rootkit?
What is a rootkit?
What is the purpose of the openssl command?
What is the purpose of the openssl command?
What is the protocol commonly used to transmit X.509 certificates?
What is the protocol commonly used to transmit X.509 certificates?
What is a plaintext?
What is a plaintext?
What is the purpose of a TLSA record in DANE?
What is the purpose of a TLSA record in DANE?
What does the configuration option SSLStrictSNIVHostCheck do in Apache HTTPD?
What does the configuration option SSLStrictSNIVHostCheck do in Apache HTTPD?
Which of the following is a characteristic of a Root CA certificate?
Which of the following is a characteristic of a Root CA certificate?
What is the purpose of HID in security?
What is the purpose of HID in security?
What is the purpose of the command ulimit in Bash?
What is the purpose of the command ulimit in Bash?
Which of the following is a best practice for implementing HID?
Which of the following is a best practice for implementing HID?
What is the purpose of the chown command in Linux?
What is the purpose of the chown command in Linux?
What is the purpose of Wireshark capture filters?
What is the purpose of Wireshark capture filters?
What is the purpose of the command openvas-nvt-sync?
What is the purpose of the command openvas-nvt-sync?
What is the purpose of the execute permission bit in Linux?
What is the purpose of the execute permission bit in Linux?
Which option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
Which option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
Which of the following practices are important for the security of private keys?
Which of the following practices are important for the security of private keys?
What is the purpose of NSEC3 in DNSSEC?
What is the purpose of NSEC3 in DNSSEC?
Which command is used to run a new shell for a user changing the SELinux context?
Which command is used to run a new shell for a user changing the SELinux context?
Which file is used to configure AIDE?
Which file is used to configure AIDE?
What is the purpose of ndpmon?
What is the purpose of ndpmon?
What is the advantage of creating private keys on the systems where they will be used?
What is the advantage of creating private keys on the systems where they will be used?
What is the purpose of keeping private keys confidential?
What is the purpose of keeping private keys confidential?
What is the purpose of the setfattr
command?
What is the purpose of the setfattr
command?
What is an example of a behavioral-based HID technique?
What is an example of a behavioral-based HID technique?
What is the difference between a SetUID and SetGID bit?
What is the difference between a SetUID and SetGID bit?
What is the purpose of the auditd
tool?
What is the purpose of the auditd
tool?
What is a buffer overflow?
What is a buffer overflow?
What is the purpose of the ausearch
command?
What is the purpose of the ausearch
command?
What package management tools can be used to verify the integrity of installed files on a Linux system?
What package management tools can be used to verify the integrity of installed files on a Linux system?
What is a honeypot?
What is a honeypot?
What is the purpose of the openssl
command with the -servername
option?
What is the purpose of the openssl
command with the -servername
option?
What is an asymmetric key?
What is an asymmetric key?
What is the purpose of a honeypot?
What is the purpose of a honeypot?
Which of the following is used to perform DNSSEC validation on behalf of clients?
Which of the following is used to perform DNSSEC validation on behalf of clients?
What is the purpose of IP sets?
What is the purpose of IP sets?
What is the purpose of an extended attribute in Linux?
What is the purpose of an extended attribute in Linux?
Which file is used to configure rkhunter?
Which file is used to configure rkhunter?
What is the purpose of TSIG in DNS?
What is the purpose of TSIG in DNS?
What is privilege escalation?
What is privilege escalation?
What is the purpose of the pam_cracklib PAM module?
What is the purpose of the pam_cracklib PAM module?
What is the purpose of SELinux?
What is the purpose of SELinux?
What is the purpose of the openvpn command?
What is the purpose of the openvpn command?
What is the primary purpose of issuing and signing X.509 certificates?
What is the primary purpose of issuing and signing X.509 certificates?
What is the purpose of the push directive in an OpenVPN server configuration?
What is the purpose of the push directive in an OpenVPN server configuration?
Which of the following is a valid stanza for a client configuration in FreeRADIUS?
Which of the following is a valid stanza for a client configuration in FreeRADIUS?
What is the purpose of the Linux Malware Detect tool?
What is the purpose of the Linux Malware Detect tool?
What is a Trojan?
What is a Trojan?
What is the purpose of the dnssec-keygen command?
What is the purpose of the dnssec-keygen command?
What is the purpose of a trust anchor?
What is the purpose of a trust anchor?
What is a rogue access point?
What is a rogue access point?
What is the purpose of the chmod command in Linux?
What is the purpose of the chmod command in Linux?
What is the main purpose of a Certificate Authority (CA)?
What is the main purpose of a Certificate Authority (CA)?
What is the primary purpose of an X.509 certificate?
What is the primary purpose of an X.509 certificate?
What is the main difference between a chroot environment and a regular environment?
What is the main difference between a chroot environment and a regular environment?
Which of the following statements is true about AppArmor?
Which of the following statements is true about AppArmor?
What is the primary purpose of AIDE?
What is the primary purpose of AIDE?
What is phishing?
What is phishing?
What is the primary purpose of DNS over TLS and DNS over HTTPS?
What is the primary purpose of DNS over TLS and DNS over HTTPS?
What is the primary purpose of a Certificate Revocation List (CRL)?
What is the primary purpose of a Certificate Revocation List (CRL)?
Which of the following DNS records is used to map an IP address to a hostname?
Which of the following DNS records is used to map an IP address to a hostname?
What is host intrusion detection (HID)?
What is host intrusion detection (HID)?
What is the purpose of a DNSKEY record in DNSSEC?
What is the purpose of a DNSKEY record in DNSSEC?
Which tool is used to check for rootkits on a Linux system?
Which tool is used to check for rootkits on a Linux system?
What happens when the command getfattr afile is run while the file afile has no extended attributes set?
What happens when the command getfattr afile is run while the file afile has no extended attributes set?
Which command deletes only the first key from a LUKS device?
Which command deletes only the first key from a LUKS device?
Which statement is true regarding eCryptfs?
Which statement is true regarding eCryptfs?
Which command disables the automatic password expiry for a user?
Which command disables the automatic password expiry for a user?
How does TSIG authenticate name servers for secured zone transfers?
How does TSIG authenticate name servers for secured zone transfers?
Which of the following utilities is used to generate keys for DNSSEC?
Which of the following utilities is used to generate keys for DNSSEC?
Which command makes the contents of an eCryptfs encrypted directory available to the user?
Which command makes the contents of an eCryptfs encrypted directory available to the user?
Which of the following is an example of an HID tool?
Which of the following is an example of an HID tool?
Which statement is true regarding an X509 certificate?
Which statement is true regarding an X509 certificate?
What is the primary function of rkhunter?
What is the primary function of rkhunter?
What is the purpose of a Certificate Authority (CA)?
What is the purpose of a Certificate Authority (CA)?
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?
Which permission bit allows a user to delete a file?
Which permission bit allows a user to delete a file?
What is a certificate chain?
What is a certificate chain?
Which command changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Which command changes the source IP address to 192.0.2.11 for all IPv4 packets which go through the network interface eth0?
Which of the following commands adds users using SSSD’s local service?
Which of the following commands adds users using SSSD’s local service?
Which DNS records are used in DNSSEC?
Which DNS records are used in DNSSEC?
What is the purpose of OpenVPN?
What is the purpose of OpenVPN?
Which of the following scan techniques with nmap?
Which of the following scan techniques with nmap?
Which of the following authentication methods was added to NFS in version 4?
Which of the following authentication methods was added to NFS in version 4?
What is OCSP stapling?
What is OCSP stapling?
What is the purpose of the command ipa-server-install?
What is the purpose of the command ipa-server-install?
What is the openssl command to generate a certificate signing request (CSR) using the already existing private key contained in the file private/keypair.pem?
What is the openssl command to generate a certificate signing request (CSR) using the already existing private key contained in the file private/keypair.pem?
What is Cryptography?
What is Cryptography?
What type of activity does HID monitor for?
What type of activity does HID monitor for?
What is a ciphertext?
What is a ciphertext?
Which of the following commands defines an audit rule that monitors read and write operations to the file /etc/firewall/rules and associates the rule with the name firewall?
Which of the following commands defines an audit rule that monitors read and write operations to the file /etc/firewall/rules and associates the rule with the name firewall?
What is a rootkit?
What is a rootkit?
Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?
Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?
What is the purpose of a TLSA record in DANE?
What is the purpose of a TLSA record in DANE?
Which command is used to update NVTs from the OpenVAS NVT feed?
Which command is used to update NVTs from the OpenVAS NVT feed?
What is the purpose of the SSLVerifyClient require configuration option in Apache HTTPD?
What is the purpose of the SSLVerifyClient require configuration option in Apache HTTPD?
Which of the following statements are true regarding the certificate of a Root CA?
Which of the following statements are true regarding the certificate of a Root CA?
Which of the following permissions is required to execute a file?
Which of the following permissions is required to execute a file?
How can host scans be automated on a Linux system?
How can host scans be automated on a Linux system?
Which of the following configuration options makes Apache HTTPD require a client certificate for authentication?
Which of the following configuration options makes Apache HTTPD require a client certificate for authentication?
What is the purpose of SELinux permissions?
What is the purpose of SELinux permissions?
Which command is used to set the owner and group of a file in Linux?
Which command is used to set the owner and group of a file in Linux?
Which of the following Wireshark capture filters is valid?
Which of the following Wireshark capture filters is valid?
Study Notes
Security and Networking Concepts
- Exam 303-300: LPIC-3 Security
File Systems and Permissions
- File ownership in Linux systems restricts access to files only to their owner
chown
command is used to change the ownership of a filechmod
command is used to set the permissions of a file- Extended attributes in Linux store additional metadata about a file
getfacl
command is used to view the access control list of a filesetfacl
command is used to set the access control list of a file
Network Security
- DNSSEC (Domain Name System Security Extensions) is a security protocol for DNS
- NSEC3 is a type of DNS record used in DNSSEC
- RRSIG is a type of DNS record used in DNSSEC
- TSIG is used to sign DNS messages for secure communication
- IP sets group together IP addresses that can be referenced by netfilter rules
Cryptography and Certification
- Asymmetric key: a key used for encryption and decryption that is generated in a pair
- Symmetric key: a key used for encryption and decryption that is the same
- Certificate Authority (CA) issues and signs X.509 certificates
- Trust anchor: a root certificate that is trusted by a particular CA
- TLSA record in DANE publishes X.509 certificate and certificate authority information in DNS
Linux Security
- Linux Audit system detects intrusions and system changes
ausearch
command is used to search and filter the audit logauditd
is the Linux Audit system's daemon- SELinux (Security-Enhanced Linux) is a Mandatory Access Control (MAC) system
Network Attacks and Defenses
- Buffer overflow: a type of software vulnerability
- Man-in-the-middle attack: an attack that intercepts communications between two parties
- DoS (Denial of Service) attack: an attack that floods a network or server with traffic to make it unavailable
- Trojan: a type of malware that disguises itself as legitimate software
- Rogue access point: an unauthorized access point that is set up to look like a legitimate one
Firewalls and Networking
iptables
command is used to configure the Linux firewallnmap
is a network exploration and security auditing tool- OpenVPN is a virtual private network (VPN) solution
Other Security Concepts
- Privilege escalation: an attack that exploits a vulnerability to gain elevated privileges
- Honeypot: a network security tool designed to lure attackers into a trap
- AIDE (Advanced Intrusion Detection Environment) is a file integrity checker and incident response tool
rkhunter
is a tool to detect rootkits and other security threats### Security Fundamentals- Host intrusion detection (HID) monitors a single computer or server for potential security threats.
- HID can detect unauthorized access attempts, but does not provide automatic removal of detected threats.
- Cryptography is the art of sending secret messages.
File Permissions and Access Control
- SELinux permissions are verified before standard Linux permissions.
- The
chown
command is used to set the owner and group of a file in Linux. - Access control lists (ACLs) in Linux specify fine-grained permissions for users and groups.
Network Security
- OCSP stapling is a mechanism that allows a server to provide proof of the revocation status of its own SSL/TLS certificate.
- LUKS (Linux Unified Key Setup) is a disk encryption system.
cryptsetup
is used to set up and configure LUKS devices.getfattr
displays extended attributes of a file or directory.
Certificates and Authentication
- X.509 certificates are digital documents that verify the identity of a website, person, device, or company.
- A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA.
- DNSSEC (Domain Name System Security Extensions) is a set of extensions to DNS that provide security by verifying the authenticity of DNS data.
- TSIG (Transaction Signature) authenticates name servers in order to perform secured zone transfers.
- eCryptfs is a stacked Linux filesystem that provides encryption and access control for directories.
System Security
chage
is used to change the password expiry information for a user.snort-stat
displays statistics from the running Snort process.chkrootkit
is a tool that checks for rootkits on a Linux system.- AppArmor and SELinux are both mandatory access control systems, but they have different implementation and configuration approaches.
aide
is a tool that detects intrusions and system changes.
DNS Security
- DNSSEC-signed zones use a key signing key to sign the zone signing key of the zone.
- The
DNSKEY
record in DNSSEC is used to sign a DNS zone. - DNS over TLS and DNS over HTTPS provide secure communication between DNS clients and servers.
- DANE (DNS-based Authentication of Named Entities) is used to secure HTTPS connections.
Other Security Concepts
- Phishing is a type of social engineering attack that exploits human psychology to gain access to sensitive information.
- Social engineering is a type of attack that exploits human psychology to gain access to sensitive information.
- Rootkits are a type of malware that disguises itself as legitimate software.
openvas-nvt-sync
is a command that updates NVTs (Network Vulnerability Tests) from the OpenVAS NVT feed.ipa-server-install
is a command that installs and configures a new FreeIPA server, including all sub-components, and creates a new FreeIPA domain.
Security and Networking Concepts
- Exam 303-300: LPIC-3 Security
File Systems and Permissions
- File ownership in Linux systems restricts access to files only to their owner
chown
command is used to change the ownership of a filechmod
command is used to set the permissions of a file- Extended attributes in Linux store additional metadata about a file
getfacl
command is used to view the access control list of a filesetfacl
command is used to set the access control list of a file
Network Security
- DNSSEC (Domain Name System Security Extensions) is a security protocol for DNS
- NSEC3 is a type of DNS record used in DNSSEC
- RRSIG is a type of DNS record used in DNSSEC
- TSIG is used to sign DNS messages for secure communication
- IP sets group together IP addresses that can be referenced by netfilter rules
Cryptography and Certification
- Asymmetric key: a key used for encryption and decryption that is generated in a pair
- Symmetric key: a key used for encryption and decryption that is the same
- Certificate Authority (CA) issues and signs X.509 certificates
- Trust anchor: a root certificate that is trusted by a particular CA
- TLSA record in DANE publishes X.509 certificate and certificate authority information in DNS
Linux Security
- Linux Audit system detects intrusions and system changes
ausearch
command is used to search and filter the audit logauditd
is the Linux Audit system's daemon- SELinux (Security-Enhanced Linux) is a Mandatory Access Control (MAC) system
Network Attacks and Defenses
- Buffer overflow: a type of software vulnerability
- Man-in-the-middle attack: an attack that intercepts communications between two parties
- DoS (Denial of Service) attack: an attack that floods a network or server with traffic to make it unavailable
- Trojan: a type of malware that disguises itself as legitimate software
- Rogue access point: an unauthorized access point that is set up to look like a legitimate one
Firewalls and Networking
iptables
command is used to configure the Linux firewallnmap
is a network exploration and security auditing tool- OpenVPN is a virtual private network (VPN) solution
Other Security Concepts
- Privilege escalation: an attack that exploits a vulnerability to gain elevated privileges
- Honeypot: a network security tool designed to lure attackers into a trap
- AIDE (Advanced Intrusion Detection Environment) is a file integrity checker and incident response tool
rkhunter
is a tool to detect rootkits and other security threats### Security Fundamentals- Host intrusion detection (HID) monitors a single computer or server for potential security threats.
- HID can detect unauthorized access attempts, but does not provide automatic removal of detected threats.
- Cryptography is the art of sending secret messages.
File Permissions and Access Control
- SELinux permissions are verified before standard Linux permissions.
- The
chown
command is used to set the owner and group of a file in Linux. - Access control lists (ACLs) in Linux specify fine-grained permissions for users and groups.
Network Security
- OCSP stapling is a mechanism that allows a server to provide proof of the revocation status of its own SSL/TLS certificate.
- LUKS (Linux Unified Key Setup) is a disk encryption system.
cryptsetup
is used to set up and configure LUKS devices.getfattr
displays extended attributes of a file or directory.
Certificates and Authentication
- X.509 certificates are digital documents that verify the identity of a website, person, device, or company.
- A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA.
- DNSSEC (Domain Name System Security Extensions) is a set of extensions to DNS that provide security by verifying the authenticity of DNS data.
- TSIG (Transaction Signature) authenticates name servers in order to perform secured zone transfers.
- eCryptfs is a stacked Linux filesystem that provides encryption and access control for directories.
System Security
chage
is used to change the password expiry information for a user.snort-stat
displays statistics from the running Snort process.chkrootkit
is a tool that checks for rootkits on a Linux system.- AppArmor and SELinux are both mandatory access control systems, but they have different implementation and configuration approaches.
aide
is a tool that detects intrusions and system changes.
DNS Security
- DNSSEC-signed zones use a key signing key to sign the zone signing key of the zone.
- The
DNSKEY
record in DNSSEC is used to sign a DNS zone. - DNS over TLS and DNS over HTTPS provide secure communication between DNS clients and servers.
- DANE (DNS-based Authentication of Named Entities) is used to secure HTTPS connections.
Other Security Concepts
- Phishing is a type of social engineering attack that exploits human psychology to gain access to sensitive information.
- Social engineering is a type of attack that exploits human psychology to gain access to sensitive information.
- Rootkits are a type of malware that disguises itself as legitimate software.
openvas-nvt-sync
is a command that updates NVTs (Network Vulnerability Tests) from the OpenVAS NVT feed.ipa-server-install
is a command that installs and configures a new FreeIPA server, including all sub-components, and creates a new FreeIPA domain.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of Linux system administration, IT security, and network protocols. This quiz covers various aspects of system administration, security, and networking.