Question: Question 11 True or False? A SYN flood is a denial of service (DoS) attack based on a rapid succession of SYN packets requesting synchronization

Question 11

True or False? A SYN flood is a denial of service (DoS) attack based on a rapid succession of SYN packets requesting synchronization with a target system.

Question 11 options:

True
False

Question 12

What does the following option in the /etc/sysctl.conf file do? net.ipv4.icmp_ignore_bogus_error_responses = 1

Question 12 options:

Ignores Internet Control Message Protocol (ICMP) messages that do not conform to standards
Prevents systems from replying to broadcast ping requests
Protects from SYN floods
Prevents Internet Protocol version 4 (IPv4) forwarding on a system

Question 13

True or False? Samba is the Linux implementation of the Microsoft Server Message Block protocol, which has evolved into the Common Internet File System (CIFS).

Question 13 options:

True
False

Question 14

True or False? The Internet Assigned Numbers Authority (IANA) classifies port numbers as well known, registered, or dynamic or private.

Question 14 options:

True
False

Question 15

Recursive queries are commonly associated with which of the following?

Question 15 options:

Squid
The server.csr file
Postfix
Domain Name System (DNS) servers

Question 16

True or False? With the pre-shared key form of authentication, the key is stored in cleartext in the configuration file, although the file has limited permissions.

Question 16 options:

True
False

Question 17

True or False? You can disable AppArmor with the apparmor=no entry on the kernel command line in the bootloader.

Question 17 options:

True
False

Question 18

Which of the following basic directives enables a Windows Internet Name Service (WINS) server on the local system?

Question 18 options:

dns proxy
wins proxy
wins server
wins support

Question 19

True or False? Asterisk is different from other services in that it can support multiple connections between the same two Internet Protocol (IP) addresses.

Question 19 options:

True
False

Question 20

Which section of the kernel configuration tool is designed for kernel developers who want to see what happens with the kernel in detail in basic operation?

Question 20 options:

Filesystems
Kernel hacking
Security options
Enable the block layer

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!