Security Management Linux Chp12

Security Management Linux Chp12

University

17 Qs

quiz-placeholder

Similar activities

LA6.C6: Graphics Window

LA6.C6: Graphics Window

9th Grade - University

14 Qs

Chap 1: What is a program made of?

Chap 1: What is a program made of?

University

13 Qs

LA7.C7: Turtle Graphics

LA7.C7: Turtle Graphics

9th Grade - University

14 Qs

Linux Directory Structures

Linux Directory Structures

10th Grade - University

20 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

POST-TEST MODUL 1 APSI

POST-TEST MODUL 1 APSI

University

15 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

Security Management Linux Chp12

Security Management Linux Chp12

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Sandeep Kumar

Used 26+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to calculate SHA256 hash values?

sha256sum

sha512sum

sha1sum

md5sum

Answer explanation

The command used to calculate SHA 256 hash values is 'sha256sum'. It is a secure hash algorithm that produces a 256-bit hash value. Other options like 'sha512sum', 'sha1sum', and 'md5sum' are different hash algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to calculate MD5 hash values?

md5
hashsum
md5hash
md5sum

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the open source implementation of SSL/TLS?

OpenSSL/TLS

OpenSSH

OpenSecureSocketLayer

OpenSSL

Answer explanation

OpenSSL is the open source implementation of SSL/TLS. It is widely used for secure communication over the internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user logs in once and is able to gain access to other systems. This is known as ?

Single Sign-On (SSO)

Multi-Factor Authentication (MFA)

Password Encryption

Two-Factor Authentication (2FA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the protocol that is used to manage directory services?

LDAP
SMTP
HTTP
FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ defines the underlying framework and centralized authentication method leveraged by Kerberos and LDAP.

OpenLDAP

Novell eDirectory

Samba

PAM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which directory can you find the files for configuring PAM?

/etc/pam.conf    or    /etc/pam.d

/var/pam.d/
/usr/pam.d/
/etc/pam.d/config

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?