Podcast
Questions and Answers
Which of the following commands is used to view the access control list of a file?
Which of the following commands is used to view the access control list of a file?
- chmod
- getfacl (correct)
- setfacl
- ls
SELinux establishes a Mandatory Access Control (MAC) model.
SELinux establishes a Mandatory Access Control (MAC) model.
True (A)
What type of attack involves intercepting communications between two parties to steal information?
What type of attack involves intercepting communications between two parties to steal information?
man-in-the-middle attack
The openvpn command option to ensure that ephemeral keys are not written to the swap space is __________________.
The openvpn command option to ensure that ephemeral keys are not written to the swap space is __________________.
Match the following scan techniques with nmap:
Match the following scan techniques with nmap:
Which of the following is NOT a namespace for Linux Extended File Attributes?
Which of the following is NOT a namespace for Linux Extended File Attributes?
TCP traffic from 10.142.232.1 destined for port 20 or 21 is accepted.
TCP traffic from 10.142.232.1 destined for port 20 or 21 is accepted.
What is the command to add a new user usera to FreeIPA?
What is the command to add a new user usera to FreeIPA?
What is the purpose of ICMP echo requests in a network monitoring tool?
What is the purpose of ICMP echo requests in a network monitoring tool?
Asymmetric keys are used for both encryption and decryption with the same key.
Asymmetric keys are used for both encryption and decryption with the same key.
What is an example of a behavioral-based HID technique?
What is an example of a behavioral-based HID technique?
The command to revoke ACL-based write access for groups and named users on a file is setfacl _______________________
.
The command to revoke ACL-based write access for groups and named users on a file is setfacl _______________________
.
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
The option "httpd-ssl.conf" in an Apache HTTPD configuration file enables OCSP stapling.
The option "httpd-ssl.conf" in an Apache HTTPD configuration file enables OCSP stapling.
Match the following database names with their corresponding uses in a Name Service Switch (NSS) configuration file:
Match the following database names with their corresponding uses in a Name Service Switch (NSS) configuration file:
An asymmetric key is a key used for _______________________ and decryption that is generated in a pair.
An asymmetric key is a key used for _______________________ and decryption that is generated in a pair.
Which of the following DNS records is used to map an IP address to a hostname?
Which of the following DNS records is used to map an IP address to a hostname?
A Certificate Revocation List (CRL) is a list of X.509 certificates that have been issued by a particular CA.
A Certificate Revocation List (CRL) is a list of X.509 certificates that have been issued by a particular CA.
What is the purpose of AIDE?
What is the purpose of AIDE?
Phishing is a type of _______________________ attack.
Phishing is a type of _______________________ attack.
Match the following terms with their definitions:
Match the following terms with their definitions:
What is the purpose of a DNSKEY record in DNSSEC?
What is the purpose of a DNSKEY record in DNSSEC?
A Certificate Revocation List (CRL) is a list of public keys that have been compromised.
A Certificate Revocation List (CRL) is a list of public keys that have been compromised.
What is the term for detecting and responding to cyber threats in real-time?
What is the term for detecting and responding to cyber threats in real-time?
Study Notes
Network Monitoring
- It monitors remote hosts by periodically sending echo requests to them.
Asymmetric Keys
- An asymmetric key is a key used for both encryption and decryption that is generated in a pair.
HID Techniques
- Anomaly-based detection is a behavioral-based HID technique.
File Permissions
- The command
setfacl
is used to set access control lists (ACLs) on files. - The command
setfattr
is used to set extended attributes on files. - The command
getfacl
is used to view the access control list of a file.
DNS
- The PTR record is used to map an IP address to a hostname.
- The DNSKEY record is used to sign a DNS zone in DNSSEC.
Security
- Phishing is a type of social engineering attack.
- Social engineering is a type of attack that aims to deceive individuals into divulging sensitive information.
Access Control
- Mandatory Access Control (MAC) is an access control model established by using SELinux.
VPNs
- The
--mlock
option of theopenvpn
command is used to ensure that ephemeral keys are not written to the swap space.
Linux File Attributes
- Linux Extended File Attributes are organized in namespaces, including
system
,trusted
, anduser
.
Nmap Scan Techniques
- Existing scan techniques with nmap include Xmas Scan and FIN Scan.
User Management
- The
ipa user-add
command is used to add a new user to FreeIPA.
Security Threats
- A man-in-the-middle attack is an attack that intercepts communications between two parties to steal information.
- A Certificate Revocation List (CRL) is a list of X.509 certificates that have been revoked by a particular CA.
- Host intrusion detection (HID) is a system that monitors and detects potential security threats on a single computer or server.
- AIDE is used to detect intrusions and system changes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Identify the correct description of a network monitoring tool and understand the concept of asymmetric key in cryptography.