Network Monitoring and Security
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following commands is used to view the access control list of a file?

  • chmod
  • getfacl (correct)
  • setfacl
  • ls
  • SELinux establishes a Mandatory Access Control (MAC) model.

    True

    What type of attack involves intercepting communications between two parties to steal information?

    man-in-the-middle attack

    The openvpn command option to ensure that ephemeral keys are not written to the swap space is __________________.

    <p>--mlock</p> Signup and view all the answers

    Match the following scan techniques with nmap:

    <p>A. = Xmas Scan B. = Zero Scan C. = FIN Scan D. = IP Scan E. = UDP SYN Scan</p> Signup and view all the answers

    Which of the following is NOT a namespace for Linux Extended File Attributes?

    <p>default</p> Signup and view all the answers

    TCP traffic from 10.142.232.1 destined for port 20 or 21 is accepted.

    <p>True</p> Signup and view all the answers

    What is the command to add a new user usera to FreeIPA?

    <p>ipa user-add usera --first User --last A</p> Signup and view all the answers

    What is the purpose of ICMP echo requests in a network monitoring tool?

    <p>To monitor remote hosts for availability</p> Signup and view all the answers

    Asymmetric keys are used for both encryption and decryption with the same key.

    <p>False</p> Signup and view all the answers

    What is an example of a behavioral-based HID technique?

    <p>Anomaly-based detection</p> Signup and view all the answers

    The command to revoke ACL-based write access for groups and named users on a file is setfacl _______________________.

    <p><code>~m group: * : rx, user:*: rx</code></p> Signup and view all the answers

    Which command is used to set an extended attribute on a file in Linux?

    <p>setfattr</p> Signup and view all the answers

    The option "httpd-ssl.conf" in an Apache HTTPD configuration file enables OCSP stapling.

    <p>False</p> Signup and view all the answers

    Match the following database names with their corresponding uses in a Name Service Switch (NSS) configuration file:

    <p>A) host = Host database B) shadow = Shadow password database C) service = Service database D) passwd = Password database</p> Signup and view all the answers

    An asymmetric key is a key used for _______________________ and decryption that is generated in a pair.

    <p>both encryption</p> Signup and view all the answers

    Which of the following DNS records is used to map an IP address to a hostname?

    <p>PTR</p> Signup and view all the answers

    A Certificate Revocation List (CRL) is a list of X.509 certificates that have been issued by a particular CA.

    <p>False</p> Signup and view all the answers

    What is the purpose of AIDE?

    <p>to detect intrusions and system changes</p> Signup and view all the answers

    Phishing is a type of _______________________ attack.

    <p>social engineering</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Host Intrusion Detection (HID) = A system that monitors and detects potential security threats on a single computer or server Social Engineering = A type of attack that manipulates users into revealing sensitive information</p> Signup and view all the answers

    What is the purpose of a DNSKEY record in DNSSEC?

    <p>To sign a DNS zone</p> Signup and view all the answers

    A Certificate Revocation List (CRL) is a list of public keys that have been compromised.

    <p>False</p> Signup and view all the answers

    What is the term for detecting and responding to cyber threats in real-time?

    <p>intrusion detection</p> Signup and view all the answers

    Study Notes

    Network Monitoring

    • It monitors remote hosts by periodically sending echo requests to them.

    Asymmetric Keys

    • An asymmetric key is a key used for both encryption and decryption that is generated in a pair.

    HID Techniques

    • Anomaly-based detection is a behavioral-based HID technique.

    File Permissions

    • The command setfacl is used to set access control lists (ACLs) on files.
    • The command setfattr is used to set extended attributes on files.
    • The command getfacl is used to view the access control list of a file.

    DNS

    • The PTR record is used to map an IP address to a hostname.
    • The DNSKEY record is used to sign a DNS zone in DNSSEC.

    Security

    • Phishing is a type of social engineering attack.
    • Social engineering is a type of attack that aims to deceive individuals into divulging sensitive information.

    Access Control

    • Mandatory Access Control (MAC) is an access control model established by using SELinux.

    VPNs

    • The --mlock option of the openvpn command is used to ensure that ephemeral keys are not written to the swap space.

    Linux File Attributes

    • Linux Extended File Attributes are organized in namespaces, including system, trusted, and user.

    Nmap Scan Techniques

    • Existing scan techniques with nmap include Xmas Scan and FIN Scan.

    User Management

    • The ipa user-add command is used to add a new user to FreeIPA.

    Security Threats

    • A man-in-the-middle attack is an attack that intercepts communications between two parties to steal information.
    • A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA.
    • Host intrusion detection (HID) is a system that monitors and detects potential security threats on a single computer or server.
    • AIDE is used to detect intrusions and system changes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    303-300-1.pdf

    Description

    Identify the correct description of a network monitoring tool and understand the concept of asymmetric key in cryptography.

    More Like This

    Network Monitoring Tools
    3 questions

    Network Monitoring Tools

    WellManneredScholarship avatar
    WellManneredScholarship
    Network Monitoring Techniques
    100 questions
    Network Monitoring Practice Quiz Week 4
    5 questions
    Use Quizgecko on...
    Browser
    Browser