Question: Question 11 True or False? A SYN flood is a denial of service (DoS) attack based on a rapid succession of SYN packets requesting synchronization
Question 11
True or False? A SYN flood is a denial of service (DoS) attack based on a rapid succession of SYN packets requesting synchronization with a target system.
Question 11 options:
| True | |
| False |
Question 12
What does the following option in the /etc/sysctl.conf file do? net.ipv4.icmp_ignore_bogus_error_responses = 1
Question 12 options:
| Ignores Internet Control Message Protocol (ICMP) messages that do not conform to standards | |
| Prevents systems from replying to broadcast ping requests | |
| Protects from SYN floods | |
| Prevents Internet Protocol version 4 (IPv4) forwarding on a system |
Question 13
True or False? Samba is the Linux implementation of the Microsoft Server Message Block protocol, which has evolved into the Common Internet File System (CIFS).
Question 13 options:
| True | |
| False |
Question 14
True or False? The Internet Assigned Numbers Authority (IANA) classifies port numbers as well known, registered, or dynamic or private.
Question 14 options:
| True | |
| False |
Question 15
Recursive queries are commonly associated with which of the following?
Question 15 options:
| Squid | |
| The server.csr file | |
| Postfix | |
| Domain Name System (DNS) servers |
Question 16
True or False? With the pre-shared key form of authentication, the key is stored in cleartext in the configuration file, although the file has limited permissions.
Question 16 options:
| True | |
| False |
Question 17
True or False? You can disable AppArmor with the apparmor=no entry on the kernel command line in the bootloader.
Question 17 options:
| True | |
| False |
Question 18
Which of the following basic directives enables a Windows Internet Name Service (WINS) server on the local system?
Question 18 options:
| dns proxy | |
| wins proxy | |
| wins server | |
| wins support |
Question 19
True or False? Asterisk is different from other services in that it can support multiple connections between the same two Internet Protocol (IP) addresses.
Question 19 options:
| True | |
| False |
Question 20
Which section of the kernel configuration tool is designed for kernel developers who want to see what happens with the kernel in detail in basic operation?
Question 20 options:
| Filesystems | |
| Kernel hacking | |
| Security options | |
| Enable the block layer |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
