Search Header Logo

Security Management Linux Chp12

Authored by Sandeep Kumar

Computers

University

Used 26+ times

Security Management Linux Chp12
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to calculate SHA256 hash values?

sha256sum

sha512sum

sha1sum

md5sum

Answer explanation

The command used to calculate SHA 256 hash values is 'sha256sum'. It is a secure hash algorithm that produces a 256-bit hash value. Other options like 'sha512sum', 'sha1sum', and 'md5sum' are different hash algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to calculate MD5 hash values?

md5
hashsum
md5hash
md5sum

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the open source implementation of SSL/TLS?

OpenSSL/TLS

OpenSSH

OpenSecureSocketLayer

OpenSSL

Answer explanation

OpenSSL is the open source implementation of SSL/TLS. It is widely used for secure communication over the internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user logs in once and is able to gain access to other systems. This is known as ?

Single Sign-On (SSO)

Multi-Factor Authentication (MFA)

Password Encryption

Two-Factor Authentication (2FA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the protocol that is used to manage directory services?

LDAP
SMTP
HTTP
FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ defines the underlying framework and centralized authentication method leveraged by Kerberos and LDAP.

OpenLDAP

Novell eDirectory

Samba

PAM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which directory can you find the files for configuring PAM?

/etc/pam.conf    or    /etc/pam.d

/var/pam.d/
/usr/pam.d/
/etc/pam.d/config

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers