Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which PAM module checks new passwords against dictionary words and enforces complexity? (Specially the module name only without any path.)

Which of the following commands makes the contents of the eCryptfs encrypted directory -/Private available to the user?

A.

ecryptfsclient

B.

ecryptfs.mount

C.

ecryptfs-mount-private

D.

decryptfs

E.

ecryptfs-manage-di rectory

Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject Alternative Name extension for the host names example.org and www.example.org to a certificate'?

A.

subjectAltName = DNS: www example.org, DNS:example.org

B.

extension= SAN: www.example.org , SAN:example.org

C.

subjectAltName: www.example.org , subjectAltName: example.org

D.

commonName = subjectAltName= www.example.org , subjectAltName = example.org

E.

subject= CN= www.example.org , CN=example.org

Which of the following commands adds a new user usera to FreelPA?

A.

useradd usera --directory ipa --gecos *User A"

B.

idap- useradd --H ldaps://ipa-server CN=UserA --attribs "Firstname: User: Lastname: A"

C.

ipa-admin create user --account usera -_fname User --iname A

D.

ipa user-add usera --first User --last A

E.

ipa-user- add usera --name "User A"

Which of the following information, within a DNSSEC- signed zone, is signed by the key signing key?

A.

The non-DNSSEC records like A, AAAA or MX

B.

The zone signing key of the zone.

C.

The RRSIG records of the zone.

D.

The NSEC or NSEC3 records of the zone.

E.

The DS records pointing to the zone

Which of the following statements describes the purpose of ndpmon?

A.

it monitors the network for neighbor discovery messages from new IPv6 hosts and routers

B.

it monitors remote hosts by periodically sending echo requests to them.

C.

it monitors the availability of a network link by querying network interfaces.

D.

It monitors the network for IPv4 nodes that have not yet migrated to IPv6.

E.

It monitors log files for failed login attempts in order to block traffic from offending network nodes

Which of the following stanzas is a valid client configuration for FreeRADIUS?

A.

client pnvate-network-1 { ipaddr = 192 0 2.0/24 password = testing123-1 }

B.

client private-network-1 { ip= 192.0.2.0/24 password-testing123-1 }

C.

client private-network-1 { ip = 192 0 2.0/24 passwd = testing123-1 }

D.

client private-network-1 { ip = 192 0.2.0/24 secret = testingl23-1 }

E.

client private-network-1 { ipaddr = 192 0 2.0/24 secret = testing 123-1}

What effect does the configuration SSLStrictSNIVHostCheck on have on an Apache HTTPD virtual host?

A.

The clients connecting to the virtual host must provide a client certificate that was issued by the same CA that issued the server's certificate.

B.

The virtual host is served only to clients that support SNI.

C.

All of the names of the virtual host must be within the same DNS zone.

D.

The virtual host is used as a fallback default for all clients that do not support SNI.

E.

Despite its configuration, the virtual host is served only on the common name and Subject Alternative Names of the server certificates.