Security Management Linux Chp12

Security Management Linux Chp12

University

17 Qs

quiz-placeholder

Similar activities

Quiz LDAP

Quiz LDAP

University

20 Qs

Kuis Pelatihan API Kutim By GIZ

Kuis Pelatihan API Kutim By GIZ

University - Professional Development

20 Qs

Section 7: Security (1-5)

Section 7: Security (1-5)

University

17 Qs

16) 211.3 Managing mailbox access

16) 211.3 Managing mailbox access

University

14 Qs

AAA Security and Access Management Quiz

AAA Security and Access Management Quiz

11th Grade - University

15 Qs

Common Ports and Protocols Review

Common Ports and Protocols Review

University

20 Qs

OSPFv2

OSPFv2

University

20 Qs

CompTIA Network+ - Ports and Protocols

CompTIA Network+ - Ports and Protocols

University

20 Qs

Security Management Linux Chp12

Security Management Linux Chp12

Assessment

Quiz

Computers

University

Medium

Created by

Sandeep Kumar

Used 22+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to calculate SHA256 hash values?

sha256sum

sha512sum

sha1sum

md5sum

Answer explanation

The command used to calculate SHA 256 hash values is 'sha256sum'. It is a secure hash algorithm that produces a 256-bit hash value. Other options like 'sha512sum', 'sha1sum', and 'md5sum' are different hash algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to calculate MD5 hash values?

md5
hashsum
md5hash
md5sum

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the open source implementation of SSL/TLS?

OpenSSL/TLS

OpenSSH

OpenSecureSocketLayer

OpenSSL

Answer explanation

OpenSSL is the open source implementation of SSL/TLS. It is widely used for secure communication over the internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user logs in once and is able to gain access to other systems. This is known as ?

Single Sign-On (SSO)

Multi-Factor Authentication (MFA)

Password Encryption

Two-Factor Authentication (2FA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the protocol that is used to manage directory services?

LDAP
SMTP
HTTP
FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ defines the underlying framework and centralized authentication method leveraged by Kerberos and LDAP.

OpenLDAP

Novell eDirectory

Samba

PAM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which directory can you find the files for configuring PAM?

/etc/pam.conf    or    /etc/pam.d

/var/pam.d/
/usr/pam.d/
/etc/pam.d/config

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?