What is the purpose of IP sets?
C
Which of the following methods can be used to deactivate a rule in Snort? (Choose TWO correct
answers.)
B, C
Which of the following keywords are built-in chairs for the iptables nat table? (Choose THREE correct
answers)
A, D, E
Which of the following commands displays all ebtable rules contained in the table filter including
their packet and byte counters?
C
Which of the following command lines sets the administrator password for ntop to testing 123?
A
Which of the following commands changes the source IP address to 192.0.2.11 for all IPv4 packets
which go through the network interface eth0?
A
What is the purpose of the program snort-stat?
E
Which of the following commands makes the contents of the eCryptfs encrypted directory -/Private
available to the user?
C
Which of the following openssl commands generates a certificate signing request (CSR) using the
already existing private key contained in the file private/keypair.pem?
B
Which command, included in BIND, generates DNSSEC keys? (Specify ONLY the command without
any path or parameters.)
dnssec-
keygen
Explanation:
http://ripe60.ripe.net/pres entations/Damas-BiND_9.7_-_DNSSE_for_humans.pdf
Which DNS label points to the DANE information used to secure HTTPS connections to
https://www.example.com/
?
E
Which of the following practices are important for the security of private keys? (Choose TWO correct
answers.)
C, D
Which of the following configuration options makes Apache HTTPD require a client certificate for
authentication?
D
Which of the following information, within a DNSSEC- signed zone, is signed by the key signing key?
B
Which of the following statements is true regarding eCryptfs?
E