Exam 19: Securing Linux

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Match each statement with an item -Allows users to share file system or directory structures over a network.

Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
Verified

E

____ attacks take place by guessing passwords and keys.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

____________________ (PAM) provides a centralized mechanism for authenticating services.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

Pluggable Authentication Module

Address spoofing is most often used on ____ firewalls.

(Multiple Choice)
4.8/5
(32)

Broadcast packets are ____ packets sent to every computer on a network.

(Multiple Choice)
4.7/5
(41)

____ programs are hidden scripts embedded in seemingly legitimate programs that are authorized by the unsuspecting victims.

(Multiple Choice)
4.8/5
(42)

Basing access control on IP addresses rather than hostnames makes authentication faster because you don't have to resolve hostnames.

(True/False)
4.9/5
(39)

Permissions are granted or removed based on three types of users, ____.

(Multiple Choice)
4.9/5
(37)

How can you change the order of authentication in Apache Web Server?

(Essay)
4.9/5
(43)

What is the purpose of the Masquerading section of the YaST Firewall module?

(Essay)
4.8/5
(32)

Every computer contains a(n) ____ to send and receive data from other computers over a network.

(Multiple Choice)
4.8/5
(32)

____ is a protocol used to ensure that data transmitted to and from a remote computer is encrypted and secure.

(Multiple Choice)
4.9/5
(30)

Why was the free derivative of Secure Shell (SSH) created?

(Essay)
4.8/5
(38)

Match each statement with an item -Allows users to log in to remote computers and interact with them over a secure network connection.

(Multiple Choice)
4.9/5
(41)

Match each statement with an item -Allows users to access a remote computer's command shell without entering a login password.

(Multiple Choice)
4.9/5
(45)

To enable or disable services, you can use the ____ module.

(Multiple Choice)
4.9/5
(32)

Which value in the /etc/pam.d/sshd file causes the entire stack to fail if the module's demands aren't met, but only after the entire stack has been processed?

(Multiple Choice)
4.9/5
(39)

Match each statement with an item -Allows Windows systems to share files and printers with Linux systems.

(Multiple Choice)
4.8/5
(38)

When security vulnerabilities are detected in Linux, it's up to ____ to find a solution.

(Multiple Choice)
4.9/5
(31)

Describe how session hijacking works and how it is prevented.

(Essay)
4.9/5
(42)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)