Running tcpdump -nli eth1 'icmp' shows the following output:
11:56:35.599063 IP 192.168.123.5 > 194.25.2.129: icmp 64: echo request seq 1 11:56:35.670910 IP 194.25.2.129 > 192.168.123.5: icmp 64: echo reply seq 1
What command was used on the host 192.168.123.5, to generate this output?
Which of the following lines in the Apache configuration file would allow only clients with a valid certificate to access the website?
A. SSLCA conf/ca.crt
B. AuthType ssl
C. IfModule libexec/ssl.c
D. SSLRequire
E. SSLVerifyClient require
Which of the following describes the main purpose of strace?
A. Show the TCP/IP stack data, to help to solve network problems
B. Help to follow the traces of intruders of the internal network
C. Debug programs by displaying the original code of the program. It is a kind of "disassembler"
D. Reverse engineer applications, resulting in the source code of the program
E. Debug programs by monitoring system calls and reporting them
In the file /var/squid/url_blacklist is a list of URLs that users should not be allowed to access. What is the correct entry in Squid's configuration file to create an acl named blacklist based on this file?
A. acl blacklist urlpath_regex /var/squid/url_blacklist
B. acl blacklist file /var/squid/url_blacklist
C. acl blacklist "/var/squid/url_blacklist"
D. acl blacklist urlpath_regex "/var/squid/url_blacklist"
E. acl urlpath_regex blacklist /var/squid/url_blacklist
What command is used to add a route to the 192.168.4.0/24 network via 192.168.0.2?
A. route add - network 192.168.4.0 netmask 255.255.255.0 gw 192.168.0.2
B. route add - net 192.168.4.0/24 gw 192.168.0.2
C. route add - network 192.168.4.0/24 192.168.0.2
D. route add - net 192.168.4.0 netmask 255.255.255.0 192.168.0.2
E. route add - net 192.168.4.0 netmask 255.255.255.0 gw 192.168.0.2
How must Samba be configured so that it can check passwords against the ones in /etc/passwd and /etc/shadow?
A. Set the parameters "encrypt passwords = yes" and "password file = /etc/passwd".
B. Set the parameters "encrypt passwords = yes", "password file = /etc/passwd" and "password algorithm = crypt".
C. Delete the smbpasswd file and create a symbolic link to the passwd and shadow file.
D. It is not possible for Samba to use /etc/passwd and /etc/shadow directly.
E. Run smbpasswd to convert /etc/passwd and /etc/shadow to a Samba password file.
Which command is used to tell the NFS server which filesystems to make available to clients?
A. exportfs
B. mkfs.nfs
C. mount
D. nfsservctl
E. telinit
It has been discovered that the company mail server is configured as an open relay. Which of the following actions would help prevent the mail server from being used as an open relay? (Choose TWO correct answers.)
A. Restrict Postfix to only accept e-mail for domains hosted on this server.
B. Configure Dovecot to support IMAP connectivity.
C. Configure netfilter to not permit port 25 traffic on the public network.
D. Restrict Postfix to only relay outbound SMTP from the internal network.
E. Upgrade the mailbox format from mbox to maildir.
Which global option in squid.conf sets the port number or numbers that Squid will use to listen for client requests?
A. port
B. client_port
C. http_port
D. server_port
E. squid_port
Which of the following daemons will monitor log files for inappropriate activity, such as login attempts, from remote IP addresses and will add netfilter rules to block the offending address?
A. fail2ban
B. portsentry
C. openids
D. logwatch