Podcast
Questions and Answers
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
- username=arg
- uid=arg (correct)
- gid=arg
- owner=arg
Where should private keys be created?
Where should private keys be created?
- On a shared network drive
- On a public key server
- On an external storage device
- On a system where they will be used (correct)
What is the purpose of NSEC3 in DNSSEC?
What is the purpose of NSEC3 in DNSSEC?
- To provide information about DNSSEC key signing keys
- To authenticate a DNS server
- To sign a DNS zone
- To prevent zone enumeration (correct)
What command is used to run a new shell for a user changing the SELinux context?
What command is used to run a new shell for a user changing the SELinux context?
Which file is used to configure AIDE?
Which file is used to configure AIDE?
What is the purpose of ndpmon?
What is the purpose of ndpmon?
Why should private keys be included in X509 certificates?
Why should private keys be included in X509 certificates?
How should private keys be stored?
How should private keys be stored?
What is the purpose of a trust anchor?
What is the purpose of a trust anchor?
What is the primary goal of a DoS attack?
What is the primary goal of a DoS attack?
Which of the following commands is used to set the permissions of a file in Linux?
Which of the following commands is used to set the permissions of a file in Linux?
What is the purpose of a TLSA record in DANE?
What is the purpose of a TLSA record in DANE?
Which of the following DNS records is used to publish X.509 certificate and certificate authority information?
Which of the following DNS records is used to publish X.509 certificate and certificate authority information?
Which of the following types of rules can be specified within the Linux Audit system?
Which of the following types of rules can be specified within the Linux Audit system?
Which of the following keywords are built-in chains for the iptables nat table?
Which of the following keywords are built-in chains for the iptables nat table?
What type of resource can be controlled by the Bash built-in command ulimit?
What type of resource can be controlled by the Bash built-in command ulimit?
What is the primary function of ICMP echo requests?
What is the primary function of ICMP echo requests?
What is an asymmetric key used for?
What is an asymmetric key used for?
What type of detection is based on identifying abnormal behavior?
What type of detection is based on identifying abnormal behavior?
Which command revokes ACL-based write access for groups and named users on a file?
Which command revokes ACL-based write access for groups and named users on a file?
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Which database name can be used within a Name Service Switch (NSS) configuration file?
Which database name can be used within a Name Service Switch (NSS) configuration file?
What is the purpose of ICMP in a network?
What is the purpose of ICMP in a network?
What is the purpose of the SSLStrictSNIVHostCheck configuration?
What is the purpose of the SSLStrictSNIVHostCheck configuration?
What is the effect of configuring SSLVerifyClient require in Apache HTTPD?
What is the effect of configuring SSLVerifyClient require in Apache HTTPD?
What is a characteristic of a Root CA certificate?
What is a characteristic of a Root CA certificate?
What is a best practice for implementing HID?
What is a best practice for implementing HID?
How do SELinux permissions relate to standard Linux permissions?
How do SELinux permissions relate to standard Linux permissions?
What is the purpose of the limit on the maximum size of written files?
What is the purpose of the limit on the maximum size of written files?
What is the purpose of the SSLRequestClientCert directive?
What is the purpose of the SSLRequestClientCert directive?
What is the purpose of the Require valid-x509 directive?
What is the purpose of the Require valid-x509 directive?
What is the method used by TSIG to authenticate name servers for secured zone transfers?
What is the method used by TSIG to authenticate name servers for secured zone transfers?
Which of the following is NOT a component of FreeIPA?
Which of the following is NOT a component of FreeIPA?
What is the utility used to generate keys for DNSSEC?
What is the utility used to generate keys for DNSSEC?
Which command makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
Which command makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
What is an example of an HID tool?
What is an example of an HID tool?
What can be concluded about an X509 certificate with the Basic Constraints extension?
What can be concluded about an X509 certificate with the Basic Constraints extension?
What is the purpose of the TSIG protocol?
What is the purpose of the TSIG protocol?
What is a characteristic of FreeIPA?
What is a characteristic of FreeIPA?
Flashcards are hidden until you start studying
Study Notes
Mounting CIFS Shares
- The
uid
option inmount.cifs
specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information.
Private Key Security
- Private keys should not be created on systems where they will be used and should never leave them.
- Private keys should have a sufficient length for the algorithm used for key generation.
- Private keys should not be uploaded to public key servers.
- Private keys should not be included in X509 certificates.
- Private keys should not be stored as plain text files without any encryption.
DNSSEC
- NSEC3 is used to prevent zone enumeration in DNSSEC.
- The purpose of a TLSA record in DANE is to sign a TLS server's public key.
- TSIG authenticates name servers in order to perform secured zone transfers by using a secret key that is shared between the servers.
SELinux
- The
newrole
command is used to run a new shell for a user changing the SELinux context. - SELinux permissions are related to standard Linux permissions.
AIDE
- The
/etc/aide/aide.conf
file is used to configure AIDE.
Behavioral-Based HID
- Anomaly-based detection is an example of a behavioral-based HID technique.
Asymmetric Keys
- An asymmetric key is a key used for both encryption and decryption that is generated in a pair.
Apache HTTPD
- The
setfattr
command is used to set an extended attribute on a file in Linux. - The
SSLVerifyClient require
option makes Apache HTTPD require a client certificate for authentication. - The
SSLStrictSNIVHostCheck
option makes the clients connecting to the virtual host provide a client certificate that was issued by the same CA that issued the server’s certificate.
DNS Records
- The CAA record is used to publish X.509 certificate and certificate authority information in DNS.
ulimit
- The
ulimit
command can be used to control the maximum size of written files, the maximum number of open file descriptors, and the maximum number of user processes.
Root CA
- The certificate of a Root CA is a self-signed certificate.
- The certificate of a Root CA does not include the private key of the CA.
- The certificate of a Root CA must contain an X509v3 Authority extension.
FreeIPA
- FreeIPA includes Kerberos KDC, Public Key Infrastructure, and Directory Server components.
DNSSEC Utilities
- The
dnssec-keygen
command is used to generate keys for DNSSEC.
eCryptfs
- The
ecryptfs-mount-private
command makes the contents of the eCryptfs encrypted directory ~/Private available to the user.
HID Tools
- A Security Information and Event Management (SIEM) system is an example of a HID tool.
X509 Certificates
- An X509 certificate contains information such as the X509v3 Basic Constraints, which specifies whether the certificate belongs to a certification authority and whether it may be used to sign certificates of subordinate certification authorities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.