1.
In apache configuration which directives are used to restrict access based on host/domain name and IP adress?
2.
Someone who whises to receive and encrypted file has provided a key UID and a key fingerprint for verification to the data sender. Assuming that this key is on a public keyserver, what command will fetch the public key from the server ?
3.
Linux Extended Attributes include attributes classes. Which of the following are included in the defined attributes classes ? (Select 3 correct answers)
4.
Which of the following is NOT and valid scan technique with nmap ?
5.
Which of the following are common techniques for securing a sendmail server ? (Select 3 correct answers)
6.
What is the purpose of tripwire?
7.
You wish to revoke write access for all groups and named users on a file. Which command will make a correct ACL changes?
8.
Which of the following are common techniques for securing Nagios ? (Select 3 correct answers)
9.
Which GPG command us used to create a revocation certificate in case a GPG key ever needs to be called?
10.
An administrator can prevent dictionary based attacks against an OpenSSH server by forcing keybased authentication with which 2 parameters in sshd_config ?