Podcast
Questions and Answers
What happens if deny rules are not defined at all for agent key rules?
What happens if deny rules are not defined at all for agent key rules?
- The agent exits with an error for all items except system.run[*] (correct)
- AllowKey without DenyKey rules are meaningless for all items
- Allow list without a single deny rule is only permitted for system.run[*] items
- The agent treats the key as if it is not supported
What is the behavior when a key is restricted by configuration?
What is the behavior when a key is restricted by configuration?
- The agent logs denied remote commands at any debug level
- The agent displays keys that are not allowed in the command line options
- The agent allows the key to be used with restrictions
- The agent treats the key as if it is not supported (correct)
What is the consequence of denied remote commands?
What is the consequence of denied remote commands?
- Denied remote commands will trigger an error message
- Denied remote commands will be executed with restrictions
- Denied remote commands will be logged in the agent log
- Denied remote commands will not be logged in the agent log (correct)
How do AllowKey and DenyKey rules affect configuration parameters?
How do AllowKey and DenyKey rules affect configuration parameters?
What is the outcome of using the DenyKey rule for a single file?
What is the outcome of using the DenyKey rule for a single file?
What is the implication of using AllowKeys for agent key rules?
What is the implication of using AllowKeys for agent key rules?
How does the agent behave when keys that are not allowed are accessed?
How does the agent behave when keys that are not allowed are accessed?
What is the behavior of the agent when deny rules are not defined for a specific item?
What is the behavior of the agent when deny rules are not defined for a specific item?
What is the consequence of using the allow list without a single deny rule for non-system.run[*] items?
What is the consequence of using the allow list without a single deny rule for non-system.run[*] items?
What happens when a key is accessed with a path that tricks the deny rule?
What happens when a key is accessed with a path that tricks the deny rule?
Which encryption method is not supported in Zabbix?
Which encryption method is not supported in Zabbix?
What is the storage format of pre-shared keys in Zabbix database and agent/proxy configuration files?
What is the storage format of pre-shared keys in Zabbix database and agent/proxy configuration files?
What are the steps involved in setting up PSK encryption on Zabbix agent or proxy?
What are the steps involved in setting up PSK encryption on Zabbix agent or proxy?
What is the requirement for Zabbix server, proxies, and agents when using certificates for encryption?
What is the requirement for Zabbix server, proxies, and agents when using certificates for encryption?
What type of keys cannot be used with the same PSK identity?
What type of keys cannot be used with the same PSK identity?
Which version of GnuTLS onwards supports mixed encryption?
Which version of GnuTLS onwards supports mixed encryption?
Where are PSK (pre-shared key) pairs stored in Zabbix frontend?
Where are PSK (pre-shared key) pairs stored in Zabbix frontend?
What are the required TLS options for Zabbix server, proxies, and agents when using certificates for encryption?
What are the required TLS options for Zabbix server, proxies, and agents when using certificates for encryption?
What is the supported replacement of OpenSSL from Zabbix 2.7 and 3.0.x?
What is the supported replacement of OpenSSL from Zabbix 2.7 and 3.0.x?
What type of errors and network issues are mentioned in the text?
What type of errors and network issues are mentioned in the text?
What type of keys starting with 'system.swap' are denied by the Zabbix Agent?
What type of keys starting with 'system.swap' are denied by the Zabbix Agent?
Which Zabbix Agent key is allowed as a percentage?
Which Zabbix Agent key is allowed as a percentage?
What type of items are disabled by default in Zabbix?
What type of items are disabled by default in Zabbix?
How does the Zabbix Agent allow for executing remote commands?
How does the Zabbix Agent allow for executing remote commands?
Which option can be used to log remote commands executed by the Zabbix Agent?
Which option can be used to log remote commands executed by the Zabbix Agent?
Which version of TLS is used for internal communications in Zabbix?
Which version of TLS is used for internal communications in Zabbix?
In Zabbix 6.0, which components can natively encrypt communications?
In Zabbix 6.0, which components can natively encrypt communications?
Which component's communication is not natively encrypted in Zabbix?
Which component's communication is not natively encrypted in Zabbix?
How does Zabbix support encryption of communication with databases?
How does Zabbix support encryption of communication with databases?
What is required for advanced setups for database encryption in Zabbix?
What is required for advanced setups for database encryption in Zabbix?
Study Notes
Zabbix Security and Encryption Overview
- Zabbix Agent key "Free swap size" is allowed as a percentage
- All other keys starting with "system.swap" are denied
- The Latest data screen for student-XX host should show the blocked keys
- The "system.run" items are disabled by default
- The Zabbix agent allows for executing remote commands using passive or active checks
- Remote commands can be logged using the LogRemoteCommands option
- Remote commands are used in multiple places including item checks, Zabbix frontend scripts, and actions
- Zabbix uses TLS 1.2 and TLS v1.3 for internal communications
- Zabbix 6.0 can natively encrypt communications between Zabbix server and proxies, agents, databases, and web services
- Communication between Zabbix server/proxies and Zabbix Java gateway is not natively encrypted
- Zabbix supports encryption of communication with databases using TLS and certificates
- Advanced setups for DB encryption require user-generated custom CA, server, and client certificates and must be supported by the database engine
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of Zabbix security and encryption with this quiz. Explore topics such as agent key permissions, remote command execution, TLS encryption, and secure communication with databases.