Podcast
Questions and Answers
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information?
Where should private keys be created?
Where should private keys be created?
What is the purpose of NSEC3 in DNSSEC?
What is the purpose of NSEC3 in DNSSEC?
What command is used to run a new shell for a user changing the SELinux context?
What command is used to run a new shell for a user changing the SELinux context?
Signup and view all the answers
Which file is used to configure AIDE?
Which file is used to configure AIDE?
Signup and view all the answers
What is the purpose of ndpmon?
What is the purpose of ndpmon?
Signup and view all the answers
Why should private keys be included in X509 certificates?
Why should private keys be included in X509 certificates?
Signup and view all the answers
How should private keys be stored?
How should private keys be stored?
Signup and view all the answers
What is the purpose of a trust anchor?
What is the purpose of a trust anchor?
Signup and view all the answers
What is the primary goal of a DoS attack?
What is the primary goal of a DoS attack?
Signup and view all the answers
Which of the following commands is used to set the permissions of a file in Linux?
Which of the following commands is used to set the permissions of a file in Linux?
Signup and view all the answers
What is the purpose of a TLSA record in DANE?
What is the purpose of a TLSA record in DANE?
Signup and view all the answers
Which of the following DNS records is used to publish X.509 certificate and certificate authority information?
Which of the following DNS records is used to publish X.509 certificate and certificate authority information?
Signup and view all the answers
Which of the following types of rules can be specified within the Linux Audit system?
Which of the following types of rules can be specified within the Linux Audit system?
Signup and view all the answers
Which of the following keywords are built-in chains for the iptables nat table?
Which of the following keywords are built-in chains for the iptables nat table?
Signup and view all the answers
What type of resource can be controlled by the Bash built-in command ulimit?
What type of resource can be controlled by the Bash built-in command ulimit?
Signup and view all the answers
What is the primary function of ICMP echo requests?
What is the primary function of ICMP echo requests?
Signup and view all the answers
What is an asymmetric key used for?
What is an asymmetric key used for?
Signup and view all the answers
What type of detection is based on identifying abnormal behavior?
What type of detection is based on identifying abnormal behavior?
Signup and view all the answers
Which command revokes ACL-based write access for groups and named users on a file?
Which command revokes ACL-based write access for groups and named users on a file?
Signup and view all the answers
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
Signup and view all the answers
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Which option in an Apache HTTPD configuration file enables OCSP stapling?
Signup and view all the answers
Which database name can be used within a Name Service Switch (NSS) configuration file?
Which database name can be used within a Name Service Switch (NSS) configuration file?
Signup and view all the answers
What is the purpose of ICMP in a network?
What is the purpose of ICMP in a network?
Signup and view all the answers
What is the purpose of the SSLStrictSNIVHostCheck configuration?
What is the purpose of the SSLStrictSNIVHostCheck configuration?
Signup and view all the answers
What is the effect of configuring SSLVerifyClient require in Apache HTTPD?
What is the effect of configuring SSLVerifyClient require in Apache HTTPD?
Signup and view all the answers
What is a characteristic of a Root CA certificate?
What is a characteristic of a Root CA certificate?
Signup and view all the answers
What is a best practice for implementing HID?
What is a best practice for implementing HID?
Signup and view all the answers
How do SELinux permissions relate to standard Linux permissions?
How do SELinux permissions relate to standard Linux permissions?
Signup and view all the answers
What is the purpose of the limit on the maximum size of written files?
What is the purpose of the limit on the maximum size of written files?
Signup and view all the answers
What is the purpose of the SSLRequestClientCert directive?
What is the purpose of the SSLRequestClientCert directive?
Signup and view all the answers
What is the purpose of the Require valid-x509 directive?
What is the purpose of the Require valid-x509 directive?
Signup and view all the answers
What is the method used by TSIG to authenticate name servers for secured zone transfers?
What is the method used by TSIG to authenticate name servers for secured zone transfers?
Signup and view all the answers
Which of the following is NOT a component of FreeIPA?
Which of the following is NOT a component of FreeIPA?
Signup and view all the answers
What is the utility used to generate keys for DNSSEC?
What is the utility used to generate keys for DNSSEC?
Signup and view all the answers
Which command makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
Which command makes the contents of the eCryptfs encrypted directory ~/Private available to the user?
Signup and view all the answers
What is an example of an HID tool?
What is an example of an HID tool?
Signup and view all the answers
What can be concluded about an X509 certificate with the Basic Constraints extension?
What can be concluded about an X509 certificate with the Basic Constraints extension?
Signup and view all the answers
What is the purpose of the TSIG protocol?
What is the purpose of the TSIG protocol?
Signup and view all the answers
What is a characteristic of FreeIPA?
What is a characteristic of FreeIPA?
Signup and view all the answers
Study Notes
Mounting CIFS Shares
- The
uid
option inmount.cifs
specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information.
Private Key Security
- Private keys should not be created on systems where they will be used and should never leave them.
- Private keys should have a sufficient length for the algorithm used for key generation.
- Private keys should not be uploaded to public key servers.
- Private keys should not be included in X509 certificates.
- Private keys should not be stored as plain text files without any encryption.
DNSSEC
- NSEC3 is used to prevent zone enumeration in DNSSEC.
- The purpose of a TLSA record in DANE is to sign a TLS server's public key.
- TSIG authenticates name servers in order to perform secured zone transfers by using a secret key that is shared between the servers.
SELinux
- The
newrole
command is used to run a new shell for a user changing the SELinux context. - SELinux permissions are related to standard Linux permissions.
AIDE
- The
/etc/aide/aide.conf
file is used to configure AIDE.
Behavioral-Based HID
- Anomaly-based detection is an example of a behavioral-based HID technique.
Asymmetric Keys
- An asymmetric key is a key used for both encryption and decryption that is generated in a pair.
Apache HTTPD
- The
setfattr
command is used to set an extended attribute on a file in Linux. - The
SSLVerifyClient require
option makes Apache HTTPD require a client certificate for authentication. - The
SSLStrictSNIVHostCheck
option makes the clients connecting to the virtual host provide a client certificate that was issued by the same CA that issued the server’s certificate.
DNS Records
- The CAA record is used to publish X.509 certificate and certificate authority information in DNS.
ulimit
- The
ulimit
command can be used to control the maximum size of written files, the maximum number of open file descriptors, and the maximum number of user processes.
Root CA
- The certificate of a Root CA is a self-signed certificate.
- The certificate of a Root CA does not include the private key of the CA.
- The certificate of a Root CA must contain an X509v3 Authority extension.
FreeIPA
- FreeIPA includes Kerberos KDC, Public Key Infrastructure, and Directory Server components.
DNSSEC Utilities
- The
dnssec-keygen
command is used to generate keys for DNSSEC.
eCryptfs
- The
ecryptfs-mount-private
command makes the contents of the eCryptfs encrypted directory ~/Private available to the user.
HID Tools
- A Security Information and Event Management (SIEM) system is an example of a HID tool.
X509 Certificates
- An X509 certificate contains information such as the X509v3 Basic Constraints, which specifies whether the certificate belongs to a certification authority and whether it may be used to sign certificates of subordinate certification authorities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers security best practices for private keys and file system mounts, including CIFS shares and private key security.