Question: What is a Linux kernel framework that handles packets that traverse a network interface? Firewall IP Forwarding Netfilter Trusted ports What is the fundamental principle

What is a Linux kernel framework that handles packets that traverse a network interface?

Firewall IP Forwarding Netfilter Trusted ports

What is the fundamental principle of keeping organizational information accurate, free of errors, and without unauthorized modifications?

Confidentiality Availability Authentication Integrity

Which authentication method would you use that verifies a user's identity based on their physical characteristics?

Tokens Biometrics LDAP Kerberos

You have set up a training session for new Linux system administrators and you are discussing log files, their format, their location, and their contents. In general, where are most Linux system logs located?

/var/log/ /etc/logrotate.d/ syslogd /var/log/journal/

What are the most fundamental components of a public key infrastructure (PKI)?

Digital signature Digital certificate Certificate Authority (CA) Certificate Signing Request (CSR)

Several of your users want to use Linux at home but are confused by firewall rules and how to manage a firewall. What tool can you recommend to help them configure their firewalls?

Uncomplicated Firewall (UFW) Firewall zones IP sets Intrusion Prevention System (IPS)

Which file that contains the user's private key is used to configure SSH (Secure Shell) key-based authentication in Linux?

authorized_keys known_hosts config id_rsa

What is a model in which access is controlled by comparing an object's security designation and a subject's (users or other entities) security clearance?

Security-Enhanced Linux (SELinux) Mandatory Access Control (MAC) Context-based permissions AppArmor

What is it called when a user is able to obtain access to additional resources or functionality that they are normally not allowed access to?

Privilege Escalation Chroot Jail Encryption Multi-factor authentication (MFA)

What is the process of verifying that data has not been modified, whether intentionally or unintentionally, in any way?

Compression Off-site backup Integrity checking Backup

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!