Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following lines is valid in a configuration file in /etc/pam.d/?

A.

authrequired pam_unix.sotry_first_pass nullok

B.

authtry_first_pass nullok, require pam_unix.so

C.

authrequired:pam_unix.so(try_first_pass nullok)

D.

authpam_unix.so(required try_first_pass nullok)

When using mod_authz_core, which of the following strings can be used as an argument to Require in an Apache HTTPD configuration file to specify the authentication provider? (Choose three.)

A.

method

B.

all

C.

regex

D.

header

E.

expr

Which of the following Samba configuration parameters is functionally identical to the parameter read only=yes?

A.

browseable=no

B.

read write=no

C.

writeable=no

D.

write only=no

E.

write access=no

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

A.

Set the parameters “encrypt passwords = yes” and “password file = /etc/passwd”

B.

Set the parameters “encrypt passwords = yes”, “password file = /etc/passwd” and “password algorithm = crypt”

C.

Delete the smbpasswd file and create a symbolic link to the passwd and shadow file

D.

It is not possible for Samba to use /etc/passwd and /etc/shadow directly

E.

Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file

Which of the following PAM modules allows the system administrator to use an arbitrary file containing a list of user and group names with restrictions on the system resources available to them?

A.

pam_filter

B.

pam_limits

C.

pam_listfile

D.

pam_unix

Which of the following PAM modules sets and unsets environment variables?

A.

pam_set

B.

pam_shell

C.

pam-vars

D.

pam-env

E.

pam_export

For what purpose is TCP/IP stack fingerprinting used by nmap?

A.

It is used to determine the remote operating system.

B.

It is used to filter out responses from specific servers.

C.

It is used to identify duplicate responses from the same remote server.

D.

It is used to masquerade the responses of remote servers.

E.

It is used to uniquely identify servers on the network for forensics.

Which FTP names are recognized as anonymous users in vsftp when the option anonymous_enable is set to yes in the configuration files? (Choose two.)

A.

anonymous

B.

ftp

C.

In the described configuration, any username which neither belongs to an existing user nor has another special meaning is treated as anonymous user.

D.

nobody

E.

guest

Which of the following nmap parameters scans a target for open TCP ports? (Choose two.)

A.

-sO

B.

-sZ

C.

-sT

D.

-sU

E.

-sS

In order to export /usr and /bin via NFSv4, /exports was created and contains working bind mounts to /usr and /bin. The following lines are added to /etc/exports on the NFC server:

After running