Which of the following are valid NFSv4 security types?
A. RSA
B. LIPKEY
C. SPKM
D. SSL
E. Kerberos
正解:B,C,E
質問 2:
CORRECT TEXT
With SELinux, what is the command that is used for changing the context of a file? (Specify the command only, with no path information or arguments)
正解:
chcon chsid setfattr
質問 3:
The system administrator wishes to use the pam_listfile.so module to restrict which users are allowed to login via SSH. Which line will configure this behaviour?
A. auth required pam_listfile.so item=user sense=allow file=/etc/sshd/sshd.allow onerr=fail
B. auth required pam_listfile.so item=user sense=deny file=/etc/sshd/sshd.deny onerr=succeed
C. auth required pam_listfile.so item=user sense=deny file=/etc/sshd/sshd.deny onerr=fail
D. auth required pam_listfile.so item=user sense=allow file=/etc/sshd/sshd.allow onerr=succeed
正解:A
質問 4:
An administrator has created a mapping with the following command:
cryptsetup luksOpen /dev/sda1 cryptvol and has set three different keys. Which command below will delete the first key?
A. cryptsetup luksDelKey /dev/sda1 0
B. cryptsetup luksDelKey /dev/mapper/cryptvol 0
C. cryptsetup luksDelKey /dev/sda1 1
D. cryptsetup luksDelKey /dev/mapper/cryptvol 1
正解:A
質問 5:
What is the purpose of tripwire?
A. To act as a honeypot and attract attackers.
B. To monitor a server for breakin attempts and, if desired, ban the IP address.
C. To identify changes to critical system files and directories.
D. To enforce mandatory access control policies to confine users to the minimum amount of privilege required.
正解:C
質問 6:
CORRECT TEXT
Where is the global list of known SSH host keys located? (Supply the full path and filename)
正解:
/etc/ssh/ssh_known_hosts
Komiya -
117-303問題集を購入し、1週間ぐらい勉強して受かりました。楽勝です。
サポートしてくれてありがとうございました!