Which command revokes ACL-based write access for groups and named users on the file afile?
A. setfacl -x group: * : rx, user:*: rx afile
B. setfacl -x mask: : rx afile
C. setfacl ~m mask: : rx afile
D. setfacl ~m group: * : rx, user:*: rx afile
Which of the following prefixes could be present in the output of get cifsacl? (Choose THREE correct answers.)
A. ACL
B. GRANT
C. GROUP
D. OWNER
E. SlD
Which of the following are differences between AppArmor and SELinux? (Choose TWO correct answers).
A. AppArmor is implemented in user space only. SELinux is a Linux Kernel Module.
B. AppArmor is less complex and easier to configure than SELinux.
C. AppArmor neither requires nor allows any specific configuration. SELinux must always be manually configured.
D. SELinux stores information in extended file attributes. AppArmor does not maintain file specific information and states.
E. The SELinux configuration is loaded at boot time and cannot be changed later on AppArmor provides user space tools to change its behavior.
Which of the following database names can be used within a Name Service Switch (NSS) configuration file? (Choose THREE correct answers).
A. host
B. shadow
C. service
D. passwd
E. group
Which of the following sections are allowed within the Kerberos configuration file krb5.conf? (Choose THREE correct answers.)
A. [plugins]
B. [crypto]
C. [domain]
D. [capaths]
E. [realms]
How does TSlG authenticate name servers in order to perform secured zone transfers?
A. Both servers mutually verify their X509 certificates.
B. Both servers use a secret key that is shared between the servers.
C. Both servers verify appropriate DANE records for the labels of the NS records used to delegate the transferred zone.
D. Both servers use DNSSEC to mutually verify that they are authoritative for the transferred zone.
Which of the following statements are true regarding the certificate of a Root CA? (Choose THREE correct answers.)
A. It is a self-signed certificate.
B. lt does not include the private key of the CA.
C. lt must contain a host name as the common name.
D. lt has an infinite lifetime and never expires.
E. lt must contain an X509v3 Authority extension.
Which of the following configuration options makes Apache HTTPD require a client certificate for authentication?
A. Limit valid-x509
B. SSLRequestClientCert always
C. Require valid-x509
D. SSLVerifyClient require
E. SSLPolicy valid-client-cert
Which of the following commands makes the contents of the eCryptfs encrypted directory -/Private available to the user?
A. eCryptfsclient
B. eCryptfs.mount
C. eCryptfs-mount-private
D. deCryptfs
E. eCryptfs-manage-di rectory
Which of the following commands changes the source lP address to 192.o.2.11 for all lPv4 packets which go through the network interface etho?
A. iptables ~t nat -A POSTROUTlNG ~o etho -j SNAT -to-source 192.0.2.11
B. iptables ~t nat -A PREROUT1NG -\ etho -j SNAT -to-source 192.0.2.11
C. iptables -t nat -A POSTROUTlNG H etho -j DNAT -to-source 192.0.2.11
D. iptables -t mangle -A POSTROUTlNG -i etho -j SNAT -to-source 192.0.2.11
E. iptables -t mangle -A POSTROUTlNG -o etho -j SNAT -to-source 192.0.2.11