Podcast
Questions and Answers
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)
What option of mount.cifs specifies the user that appears as the local owner of the files of a mounted CIFS share when the server does not provide ownership information? (Specify ONLY the option name without any values or parameters.)
uid
Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)
Which of the following practices are important for the security of private keys? (Choose TWO correct answers.)
What is the purpose of NSEC3 in DNSSEC?
What is the purpose of NSEC3 in DNSSEC?
Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)
Which command is used to run a new shell for a user changing the SELinux context? (Specify ONLY the command without any path or parameters.)
Signup and view all the answers
Which file is used to configure AIDE?
Which file is used to configure AIDE?
Signup and view all the answers
Which of the following statements describes the purpose of ndpmon?
Which of the following statements describes the purpose of ndpmon?
Signup and view all the answers
What is an asymmetric key?
What is an asymmetric key?
Signup and view all the answers
Which of the following is an example of a behavioral-based HID technique?
Which of the following is an example of a behavioral-based HID technique?
Signup and view all the answers
Which command revokes ACL-based write access for groups and named users on the file afile? (Specify ONLY the command without any path or parameters.)
Which command revokes ACL-based write access for groups and named users on the file afile? (Specify ONLY the command without any path or parameters.)
Signup and view all the answers
Which command is used to set an extended attribute on a file in Linux?
Which command is used to set an extended attribute on a file in Linux?
Signup and view all the answers
What is the purpose of a Certificate Authority (CA)?
What is the purpose of a Certificate Authority (CA)?
Signup and view all the answers
Which of the following DNS records are used in DNSSEC?
Which of the following DNS records are used in DNSSEC?
Signup and view all the answers
Which command adds users using SSSD’s local service?
Which command adds users using SSSD’s local service?
Signup and view all the answers
What is the purpose of the Linux Audit system?
What is the purpose of the Linux Audit system?
Signup and view all the answers
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Which directive is used in an OpenVPN server configuration to send network configuration information to the client?
Signup and view all the answers
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
Which of the following sections are allowed within the Kerberos configuration file krb5.conf?
Signup and view all the answers
What is the main purpose of Linux Malware Detect?
What is the main purpose of Linux Malware Detect?
Signup and view all the answers
Which method can be used to deactivate a rule in Snort?
Which method can be used to deactivate a rule in Snort?
Signup and view all the answers
What type of threat is a Trojan?
What type of threat is a Trojan?
Signup and view all the answers
What is the purpose of the command iptables -t mangle -A POSTROUTING -o eth0 -j SNAT --to-source 192.0.2.11?
What is the purpose of the command iptables -t mangle -A POSTROUTING -o eth0 -j SNAT --to-source 192.0.2.11?
Signup and view all the answers
What type of access point is set up to look like a legitimate one?
What type of access point is set up to look like a legitimate one?
Signup and view all the answers
What is the purpose of the dnssec-keygen command?
What is the purpose of the dnssec-keygen command?
Signup and view all the answers
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
Signup and view all the answers
What type of DNS record can the command dnssec-signzone add to a zone?
What type of DNS record can the command dnssec-signzone add to a zone?
Signup and view all the answers
What is the purpose of a client configuration in FreeRADIUS?
What is the purpose of a client configuration in FreeRADIUS?
Signup and view all the answers
What is the purpose of dnssec-signzone command?
What is the purpose of dnssec-signzone command?
Signup and view all the answers
What is the function of ndpmon?
What is the function of ndpmon?
Signup and view all the answers
What is the type of key used for encryption and decryption that is the same?
What is the type of key used for encryption and decryption that is the same?
Signup and view all the answers
Which type of detection is an example of a behavioral-based HID technique?
Which type of detection is an example of a behavioral-based HID technique?
Signup and view all the answers
What is the command to set an extended attribute on a file in Linux?
What is the command to set an extended attribute on a file in Linux?
Signup and view all the answers
What is the name of the configuration file for OCSP stapling?
What is the name of the configuration file for OCSP stapling?
Signup and view all the answers
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Which of the following database names can be used within a Name Service Switch (NSS) configuration file?
Signup and view all the answers
What is the purpose of an asymmetric key?
What is the purpose of an asymmetric key?
Signup and view all the answers
What is the purpose of a trust anchor?
What is the purpose of a trust anchor?
Signup and view all the answers
What is the command to revoke ACL-based write access for groups and named users on a file?
What is the command to revoke ACL-based write access for groups and named users on a file?
Signup and view all the answers
What type of attack floods a network or server with traffic to make it unavailable?
What type of attack floods a network or server with traffic to make it unavailable?
Signup and view all the answers
What is the purpose of a TLSA record in DANE?
What is the purpose of a TLSA record in DANE?
Signup and view all the answers
Which command is used to set the permissions of a file in Linux?
Which command is used to set the permissions of a file in Linux?
Signup and view all the answers
Which DNS record is used to publish X.509 certificate and certificate authority information in DNS?
Which DNS record is used to publish X.509 certificate and certificate authority information in DNS?
Signup and view all the answers
What type of rules can be specified within the Linux Audit system?
What type of rules can be specified within the Linux Audit system?
Signup and view all the answers
Which built-in chain for the iptables nat table is used for Source Network Address Translation (SNAT)?
Which built-in chain for the iptables nat table is used for Source Network Address Translation (SNAT)?
Signup and view all the answers
What resources of a shell and its child processes can be controlled by the Bash built-in command ulimit?
What resources of a shell and its child processes can be controlled by the Bash built-in command ulimit?
Signup and view all the answers
What type of access control model is established by using SELinux?
What type of access control model is established by using SELinux?
Signup and view all the answers
Which option of the openvpn command is used to ensure that ephemeral keys are not written to the swap space?
Which option of the openvpn command is used to ensure that ephemeral keys are not written to the swap space?
Signup and view all the answers
Which of the following is an existing attribute namespace in Linux?
Which of the following is an existing attribute namespace in Linux?
Signup and view all the answers
What type of scan technique is used by nmap to identify open ports?
What type of scan technique is used by nmap to identify open ports?
Signup and view all the answers
Which command is used to view the access control list of a file?
Which command is used to view the access control list of a file?
Signup and view all the answers
What is the purpose of a man-in-the-middle attack?
What is the purpose of a man-in-the-middle attack?
Signup and view all the answers
Which command is used to add a new user to FreeIPA?
Which command is used to add a new user to FreeIPA?
Signup and view all the answers
Which type of traffic is accepted from 10.142.232.1?
Which type of traffic is accepted from 10.142.232.1?
Signup and view all the answers
What is the purpose of rkhunter?
What is the purpose of rkhunter?
Signup and view all the answers
What is a certificate chain?
What is a certificate chain?
Signup and view all the answers
What is the purpose of file ownership in Linux systems?
What is the purpose of file ownership in Linux systems?
Signup and view all the answers
What is a trust anchor?
What is a trust anchor?
Signup and view all the answers
What is a Trojan?
What is a Trojan?
Signup and view all the answers
What is a rogue access point?
What is a rogue access point?
Signup and view all the answers
What is a TLSA record in DANE used for?
What is a TLSA record in DANE used for?
Signup and view all the answers
What is the purpose of an access control list in Linux?
What is the purpose of an access control list in Linux?
Signup and view all the answers
What authentication method was added to NFS in version 4?
What authentication method was added to NFS in version 4?
Signup and view all the answers
Study Notes
Network Monitoring
- Ping is used to monitor remote hosts by periodically sending echo requests to them.
- It monitors the availability of a network link by querying network interfaces.
Asymmetric Keys
- An asymmetric key is a key used for both encryption and decryption that is generated in a pair.
HID Techniques
- Anomaly-based detection is an example of a behavioral-based HID technique.
File Access Control
- The setfacl command is used to set access control lists (ACLs) on files.
- The setfacl –x command revokes ACL-based write access for groups and named users on a file.
- The setfattr command is used to set extended attributes on a file in Linux.
Apache HTTPD Configuration
- The OCSP stapling option in an Apache HTTPD configuration file enables OCSP stapling.
Database Names
- The following database names can be used within a Name Service Switch (NSS) configuration file: passwd, host, and shadow.
Access Control Models
- SELinux establishes Mandatory Access Control (MAC).
OpenVPN
- The --mlock option of the openvpn command ensures that ephemeral keys are not written to the swap space.
Linux Extended File Attributes
- Linux Extended File Attributes are organized in namespaces: system, trusted, and user.
Nmap Scan Techniques
- Xmas Scan and FIN Scan are existing scan techniques with nmap.
File Access Control List
- The getfacl command is used to view the access control list of a file.
FreeIPA
- The ipa user-add command adds a new user to FreeIPA.
Man-in-the-Middle Attack
- A man-in-the-middle attack intercepts communications between two parties to steal information.
Setkey
- The spdadd option is used in a parameter file for setkey to create a new SPD entry.
Snort
- Placing a # in front of a rule and restarting Snort, or placing a pass rule in local.rules and restarting Snort, can be used to deactivate a rule in Snort.
SSSD
- The sss_useradd command adds users using SSSD's local service.
DNSSEC
- RRSIG records are used in DNSSEC.
Certificate Authority
- A Certificate Authority (CA) issues and signs X.509 certificates.
OpenVPN Server Configuration
- The push directive is used in an OpenVPN server configuration to send network configuration information to the client.
Kerberos Configuration
- The following sections are allowed within the Kerberos configuration file krb5.conf: [plugins], [domain], [capaths], and [realms].
Linux Audit System
- The Linux Audit system detects intrusions and system changes.
Linux Malware Detect
- Linux Malware Detect is a tool to detect malware on a Linux system.
Trojan
- A Trojan is a type of malware that disguises itself as legitimate software.
Rogue Access Point
- A rogue access point is an unauthorized access point that is set up to look like a legitimate one.
DNSSEC Key Generation
- The dnssec-keygen command generates DNSSEC keys.
FreeRADIUS Client Configuration
- The client private-network-1 stanza is a valid client configuration for FreeRADIUS.
DNS Record Types
- The dnssec-signzone command can add ASIG, NSEC, NSEC3, and RRSIG records to a zone.
File Ownership
- File ownership in Linux systems restricts access to files only to their owner.
DoS Attack
- A DoS attack floods a network or server with traffic to make it unavailable.
Trust Anchor
- A trust anchor is a root certificate that is trusted by a particular CA.
Linux Audit System Rules
- The following types can be specified within the Linux Audit system: control rules, file system rules, and system call rules.
Iptables NAT Table
- The following keywords can be specified within the iptables nat table: OUTPUT, POSTROUTING, and PREROUTING.
File Permissions
- The chmod command is used to set the permissions of a file in Linux.
DNS Records
- The CAA record is used to publish X.509 certificate and certificate authority information in DNS.
DANE
- The TLSA record is used to authenticate a TLS server's public key in DANE.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Practice questions for LPIC-3 Security exam, covering topics such as file system management and security. Prepare for your IT certification exam with these questions.