Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).
Answer : ACE
Which of the following command lines sets the administrator password for ntop to testing
123?
Answer : A
What is the purpose of IP sets?
Answer : C
What command is used to update NVTs from the OpenVAS NVT feed? (Specify ONLY the command without any path or parameters).
Answer : openvas-nvt-sync //www.openvas.org/openvas-nvt-feed.html
Which of the following lines in an OpenSSL configuration adds an X 509v3 Subject
Alternative Name extension for the host names example.org and www.example.org to a certificate'?
Answer : A
Which of the following information, within a DNSSEC- signed zone, is signed by the key signing key?
Answer : B
Which of the following commands displays all ebtable rules contained in the table filter including their packet and byte counters?
Answer : C
Which of the following access control models is established by using SELinux?
Answer : E
What is the purpose of the program snort-stat?
Answer : E
Which of the following methods can be used to deactivate a rule in Snort? (Choose TWO correct answers.)
Answer : BC
When OpenVPN sends a control packet to its peer, it expects an acknowledgement in 2 seconds by default. Which of the following options changes the timeout period to 5 seconds?
Answer : A
Which command revokes ACL-based write access for groups and named users on the file afile?
Answer : C
Which of the following statements are true regarding the certificate of a Root CA? (Choose
TWO correct answers.)
Answer : A,B,E
Linux Extended File Attributes are organized in namespaces. Which of the following names correspond to existing attribute namespaces? (Choose THREE correct answers.)
Answer : BDE
Which of the following statements are valid wireshark capture filters? {Choose TWO correct answers.)
Answer : C,E
Have any questions or issues ? Please dont hesitate to contact us