Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following command lines sets the administrator password for ntop to testing 123?

A.

ntop --set-admin-password=testing123

B.

ntop --set-password-testing123

C.

ntop --reset-password=testing 123

D.

ntop --set-new-password=testing123

Which of the following commands disables the automatic password expiry for the user usera?

A.

chage --maxdays none usera

B.

chage –maxdays 99 usera

C.

chage --maxdays -1 usera

D.

chage --lastday none usera

E.

chage --lastday 0 usera

Which of the following terms refer to existing scan techniques with nmap? (Choose TWO correct answers.)

A.

Xmas Scan

B.

Zero Scan

C.

FIN Scan

D.

IP Scan

E.

UDP SYN Scan

Which of the following statements is true regarding eCryptfs?

A.

For every file in an eCryptfs directory there exists a corresponding file that contains the encrypted content.

B.

The content of all files in an eCryptfs directory is stored in an archive file similar to a tar file with an additional index to improve performance.

C.

After unmounting an eCryptfs directory, the directory hierarchy and the original file names are still visible, although, it is not possible to view the contents of the files.

D.

When a user changes his login password, the contents of his eCryptfs home directory has to be re-encrypted using his new login password.

E.

eCryptfs cannot be used to encrypt only directories that are the home directory of a regular Linux user.

Which command revokes ACL-based write access for groups and named users on the file afile?

A.

setfacI -x group: * : rx, user:*: rx afile

B.

setfacl -x mask: : rx afile

C.

setfacl ~m mask: : rx afile

D.

setfacl ~m group: * : rx, user:*: rx afile

When OpenVPN sends a control packet to its peer, it expects an acknowledgement in 2 seconds by default. Which of the following options changes the timeout period to 5 seconds?

A.

-tls-timeout 5

B.

-tls- timeout 500

C.

-tls- timer 5

D.

-tls- timer 500

Which option of the openvpn command should be used to ensure that ephemeral keys are not written to the swap space?

A.

--mlock

B.

--no-swap

C.

--root-swap

D.

--keys-no-swap

Which of the following commands defines an audit rule that monitors read and write operations to the file/ etc/firewall/rules and associates the rule with the name firewall?

A.

auditctl -N firewall –r r: /etc/firewall/rules –r w: etc/firewall/rules

B.

auditctl -A –f /etc/firewall/rules –o r– o w –l firewall

C.

auditctl –w /etc/firewall/rules -p rw -k firewall

D.

auditctl -_read /etc/firewall/rules -_write /etc/firewall/rules --label firewall

E.

echo "n: firewall r:/etc/firewall/rules: w:/ etc/firewall/rules:" | auditctl ~

Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).

A.

host

B.

shadow

C.

service

D.

passwd

E.

group

What effect does the following command have on TCP packets?

iptables- A INPUT -d 10 142 232.1 -p tcp -dport 20:21 -j ACCEPT

A.

Forward all TCP traffic not on port 20 or 21 to the IP address 10.142 232.1

B.

Drop all TCP traffic coming from 10 142 232.1 destined for port 20 or 21.

C.

Accept only TCP traffic from 10.142 232.1 destined for port 20 or 21.

D.

Accept all TCP traffic on port 20 and 21 for the IP address 10.142.232.1