Podcast
Questions and Answers
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)
uid
Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)
Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)
- Private keys should be uploaded to public key servers.
- Private keys should always be stored as plain text files without any encryption.
- Private keys should be included in X509 certificates. (correct)
- Private keys should have a sufficient length for the algorithm used for key generation. (correct)
- Private keys should be created on the systems where they will be used and should never leave them.
What is the purpose of NSEC3 in DNSSEC?
What is the purpose of NSEC3 in DNSSEC?
- To prevent zone enumeration (correct)
- To sign a DNS zone
- To authenticate a DNS server
- To provide information about DNSSEC key signing keys
Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)
Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)
Which file is used to configure AIDE?
Which file is used to configure AIDE?
Which of the following statements describes the purpose of ndpmon?
Which of the following statements describes the purpose of ndpmon?
What is an asymmetric key?
What is an asymmetric key?
Which of the following is an example of a behavioral-based HID technique?
Which of the following is an example of a behavioral-based HID technique?
Which command revokes ACL-based write access for groups and named users on the file afile? (Specify ONLY the command without any path or parameters.)
Which command revokes ACL-based write access for groups and named users on the file afile? (Specify ONLY the command without any path or parameters.)
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
What is the purpose of a Certificate Authority (CA)?
What is the purpose of a Certificate Authority (CA)?
Which of the following DNS records are used in DNSSEC?
Which of the following DNS records are used in DNSSEC?
Which command adds users using SSSD’s local service?
Which command adds users using SSSD’s local service?
What is the purpose of the Linux Audit system?
What is the purpose of the Linux Audit system?
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
What is the main purpose of Linux Malware Detect?
What is the main purpose of Linux Malware Detect?
Which method can be used to deactivate a rule in Snort?
Which method can be used to deactivate a rule in Snort?
What type of threat is a Trojan?
What type of threat is a Trojan?
What is the purpose of the command iptables -t mangle -A POSTROUTING -o eth0 -j SNAT --to-source 192.0.2.11?
What is the purpose of the command iptables -t mangle -A POSTROUTING -o eth0 -j SNAT --to-source 192.0.2.11?
What type of access point is set up to look like a legitimate one?
What type of access point is set up to look like a legitimate one?
What is the purpose of the dnssec-keygen command?
What is the purpose of the dnssec-keygen command?
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
What type of DNS record can the command dnssec-signzone add to a zone?
What type of DNS record can the command dnssec-signzone add to a zone?
What is the purpose of a client configuration in FreeRADIUS?
What is the purpose of a client configuration in FreeRADIUS?
What is the purpose of dnssec-signzone command?
What is the purpose of dnssec-signzone command?
What is the function of ndpmon?
What is the function of ndpmon?
What is the type of key used for encryption and decryption that is the same?
What is the type of key used for encryption and decryption that is the same?
Which type of detection is an example of a behavioral-based HID technique?
Which type of detection is an example of a behavioral-based HID technique?
What is the command to set an extended attribute on a file in Linux?
What is the command to set an extended attribute on a file in Linux?
What is the name of the configuration file for OCSP stapling?
What is the name of the configuration file for OCSP stapling?
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
What is the purpose of an asymmetric key?
What is the purpose of an asymmetric key?
What is the purpose of a trust anchor?
What is the purpose of a trust anchor?
What is the command to revoke ACL-based write access for groups and named users on a file?
What is the command to revoke ACL-based write access for groups and named users on a file?
What type of attack floods a network or server with traffic to make it unavailable?
What type of attack floods a network or server with traffic to make it unavailable?
What is the purpose of a TLSA record in DANE?
What is the purpose of a TLSA record in DANE?
Which command is used to set the permissions of a file in Linux?
Which command is used to set the permissions of a file in Linux?
Which DNS record is used to publish X.509 certificate and certificate authority information in DNS?
Which DNS record is used to publish X.509 certificate and certificate authority information in DNS?
What type of rules can be specified within the Linux Audit system?
What type of rules can be specified within the Linux Audit system?
Which built-in chain for the iptables nat table is used for Source Network Address Translation (SNAT)?
Which built-in chain for the iptables nat table is used for Source Network Address Translation (SNAT)?
What resources of a shell and its child processes can be controlled by the Bash built-in command ulimit?
What resources of a shell and its child processes can be controlled by the Bash built-in command ulimit?
What type of access control model is established by using SELinux?
What type of access control model is established by using SELinux?
Which option of the openvpn command is used to ensure that ephemeral keys are not written to the swap space?
Which option of the openvpn command is used to ensure that ephemeral keys are not written to the swap space?
Which of the following is an existing attribute namespace in Linux?
Which of the following is an existing attribute namespace in Linux?
What type of scan technique is used by nmap to identify open ports?
What type of scan technique is used by nmap to identify open ports?
Which command is used to view the access control list of a file?
Which command is used to view the access control list of a file?
What is the purpose of a man-in-the-middle attack?
What is the purpose of a man-in-the-middle attack?
Which command is used to add a new user to FreeIPA?
Which command is used to add a new user to FreeIPA?
Which type of traffic is accepted from 10.142.232.1?
Which type of traffic is accepted from 10.142.232.1?
What is the purpose of rkhunter?
What is the purpose of rkhunter?
What is a certificate chain?
What is a certificate chain?
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
What is a trust anchor?
What is a trust anchor?
What is a Trojan?
What is a Trojan?
What is a rogue access point?
What is a rogue access point?
What is a TLSA record in DANE used for?
What is a TLSA record in DANE used for?
What is the purpose of an access control list in Linux?
What is the purpose of an access control list in Linux?
What authentication method was added to NFS in version 4?
What authentication method was added to NFS in version 4?
Study Notes
Network Monitoring
- Ping is used to monitor remote hosts by periodically sending echo requests to them.
- It monitors the availability of a network link by querying network interfaces.
Asymmetric Keys
- An asymmetric key is a key used for both encryption and decryption that is generated in a pair.
HID Techniques
- Anomaly-based detection is an example of a behavioral-based HID technique.
File Access Control
- The setfacl command is used to set access control lists (ACLs) on files.
- The setfacl –x command revokes ACL-based write access for groups and named users on a file.
- The setfattr command is used to set extended attributes on a file in Linux.
Apache HTTPD Configuration
- The OCSP stapling option in an Apache HTTPD configuration file enables OCSP stapling.
Database Names
- The following database names can be used within a Name Service Switch (NSS) configuration file: passwd, host, and shadow.
Access Control Models
- SELinux establishes Mandatory Access Control (MAC).
OpenVPN
- The --mlock option of the openvpn command ensures that ephemeral keys are not written to the swap space.
Linux Extended File Attributes
- Linux Extended File Attributes are organized in namespaces: system, trusted, and user.
Nmap Scan Techniques
- Xmas Scan and FIN Scan are existing scan techniques with nmap.
File Access Control List
- The getfacl command is used to view the access control list of a file.
FreeIPA
- The ipa user-add command adds a new user to FreeIPA.
Man-in-the-Middle Attack
- A man-in-the-middle attack intercepts communications between two parties to steal information.
Setkey
- The spdadd option is used in a parameter file for setkey to create a new SPD entry.
Snort
- Placing a # in front of a rule and restarting Snort, or placing a pass rule in local.rules and restarting Snort, can be used to deactivate a rule in Snort.
SSSD
- The sss_useradd command adds users using SSSD's local service.
DNSSEC
- RRSIG records are used in DNSSEC.
Certificate Authority
- A Certificate Authority (CA) issues and signs X.509 certificates.
OpenVPN Server Configuration
- The push directive is used in an OpenVPN server configuration to send network configuration information to the client.
Kerberos Configuration
- The following sections are allowed within the Kerberos configuration file krb5.conf: [plugins], [domain], [capaths], and [realms].
Linux Audit System
- The Linux Audit system detects intrusions and system changes.
Linux Malware Detect
- Linux Malware Detect is a tool to detect malware on a Linux system.
Trojan
- A Trojan is a type of malware that disguises itself as legitimate software.
Rogue Access Point
- A rogue access point is an unauthorized access point that is set up to look like a legitimate one.
DNSSEC Key Generation
- The dnssec-keygen command generates DNSSEC keys.
FreeRADIUS Client Configuration
- The client private-network-1 stanza is a valid client configuration for FreeRADIUS.
DNS Record Types
- The dnssec-signzone command can add ASIG, NSEC, NSEC3, and RRSIG records to a zone.
File Ownership
- File ownership in Linux systems restricts access to files only to their owner.
DoS Attack
- A DoS attack floods a network or server with traffic to make it unavailable.
Trust Anchor
- A trust anchor is a root certificate that is trusted by a particular CA.
Linux Audit System Rules
- The following types can be specified within the Linux Audit system: control rules, file system rules, and system call rules.
Iptables NAT Table
- The following keywords can be specified within the iptables nat table: OUTPUT, POSTROUTING, and PREROUTING.
File Permissions
- The chmod command is used to set the permissions of a file in Linux.
DNS Records
- The CAA record is used to publish X.509 certificate and certificate authority information in DNS.
DANE
- The TLSA record is used to authenticate a TLS server's public key in DANE.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Practice questions for LPIC-3 Security exam, covering topics such as file system management and security. Prepare for your IT certification exam with these questions.