Zabbix Security and Encryption Day1 P6
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What happens if deny rules are not defined at all for agent key rules?

  • The agent exits with an error for all items except system.run[*] (correct)
  • AllowKey without DenyKey rules are meaningless for all items
  • Allow list without a single deny rule is only permitted for system.run[*] items
  • The agent treats the key as if it is not supported
  • What is the behavior when a key is restricted by configuration?

  • The agent logs denied remote commands at any debug level
  • The agent displays keys that are not allowed in the command line options
  • The agent allows the key to be used with restrictions
  • The agent treats the key as if it is not supported (correct)
  • What is the consequence of denied remote commands?

  • Denied remote commands will trigger an error message
  • Denied remote commands will be executed with restrictions
  • Denied remote commands will be logged in the agent log
  • Denied remote commands will not be logged in the agent log (correct)
  • How do AllowKey and DenyKey rules affect configuration parameters?

    <p>They have no effect on the configuration parameters</p> Signup and view all the answers

    What is the outcome of using the DenyKey rule for a single file?

    <p>The file is not supported by the agent</p> Signup and view all the answers

    What is the implication of using AllowKeys for agent key rules?

    <p>It permits the usage of keys only if explicitly allowed</p> Signup and view all the answers

    How does the agent behave when keys that are not allowed are accessed?

    <p>The agent denies the access and logs the event</p> Signup and view all the answers

    What is the behavior of the agent when deny rules are not defined for a specific item?

    <p>The agent treats the item as unsupported</p> Signup and view all the answers

    What is the consequence of using the allow list without a single deny rule for non-system.run[*] items?

    <p>The agent exits with an error for all non-system.run[*] items</p> Signup and view all the answers

    What happens when a key is accessed with a path that tricks the deny rule?

    <p>The agent treats the key as unsupported</p> Signup and view all the answers

    Which encryption method is not supported in Zabbix?

    <p>PSK</p> Signup and view all the answers

    What is the storage format of pre-shared keys in Zabbix database and agent/proxy configuration files?

    <p>Plain text</p> Signup and view all the answers

    What are the steps involved in setting up PSK encryption on Zabbix agent or proxy?

    <p>Creating a directory for keys, generating a PSK key, and changing the configuration</p> Signup and view all the answers

    What is the requirement for Zabbix server, proxies, and agents when using certificates for encryption?

    <p>CA certificate, server certificate, and certificate private key</p> Signup and view all the answers

    What type of keys cannot be used with the same PSK identity?

    <p>Two different PSK keys</p> Signup and view all the answers

    Which version of GnuTLS onwards supports mixed encryption?

    <p>3.1.18</p> Signup and view all the answers

    Where are PSK (pre-shared key) pairs stored in Zabbix frontend?

    <p>Host/proxy settings</p> Signup and view all the answers

    What are the required TLS options for Zabbix server, proxies, and agents when using certificates for encryption?

    <p>CA certificate, certificate file, and key file</p> Signup and view all the answers

    What is the supported replacement of OpenSSL from Zabbix 2.7 and 3.0.x?

    <p>LibreSSL</p> Signup and view all the answers

    What type of errors and network issues are mentioned in the text?

    <p>Zabbix agent checks on different hosts</p> Signup and view all the answers

    What type of keys starting with 'system.swap' are denied by the Zabbix Agent?

    <p>Keys related to swap memory usage</p> Signup and view all the answers

    Which Zabbix Agent key is allowed as a percentage?

    <p>Free swap size</p> Signup and view all the answers

    What type of items are disabled by default in Zabbix?

    <p>system.run items</p> Signup and view all the answers

    How does the Zabbix Agent allow for executing remote commands?

    <p>Using passive or active checks</p> Signup and view all the answers

    Which option can be used to log remote commands executed by the Zabbix Agent?

    <p>LogRemoteCommands option</p> Signup and view all the answers

    Which version of TLS is used for internal communications in Zabbix?

    <p>TLS 1.2 and TLS v1.3</p> Signup and view all the answers

    In Zabbix 6.0, which components can natively encrypt communications?

    <p>Zabbix server, proxies, agents, databases, and web services</p> Signup and view all the answers

    Which component's communication is not natively encrypted in Zabbix?

    <p>Zabbix server/proxies and Zabbix Java gateway</p> Signup and view all the answers

    How does Zabbix support encryption of communication with databases?

    <p>Using TLS and certificates</p> Signup and view all the answers

    What is required for advanced setups for database encryption in Zabbix?

    <p>User-generated custom CA, server, and client certificates</p> Signup and view all the answers

    Study Notes

    Zabbix Security and Encryption Overview

    • Zabbix Agent key "Free swap size" is allowed as a percentage
    • All other keys starting with "system.swap" are denied
    • The Latest data screen for student-XX host should show the blocked keys
    • The "system.run" items are disabled by default
    • The Zabbix agent allows for executing remote commands using passive or active checks
    • Remote commands can be logged using the LogRemoteCommands option
    • Remote commands are used in multiple places including item checks, Zabbix frontend scripts, and actions
    • Zabbix uses TLS 1.2 and TLS v1.3 for internal communications
    • Zabbix 6.0 can natively encrypt communications between Zabbix server and proxies, agents, databases, and web services
    • Communication between Zabbix server/proxies and Zabbix Java gateway is not natively encrypted
    • Zabbix supports encryption of communication with databases using TLS and certificates
    • Advanced setups for DB encryption require user-generated custom CA, server, and client certificates and must be supported by the database engine

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ZCP_day_1_slides_Part6.pdf

    Description

    Test your knowledge of Zabbix security and encryption with this quiz. Explore topics such as agent key permissions, remote command execution, TLS encryption, and secure communication with databases.

    More Like This

    Zabbix 6 Day1 P1
    24 questions

    Zabbix 6 Day1 P1

    SpellboundTropicalIsland avatar
    SpellboundTropicalIsland
    Use Quizgecko on...
    Browser
    Browser