
Linux+.3
Authored by Eric Asel
Information Technology (IT)
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
75 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What has come into existence with security becoming a part of the development, integration, and maintenance lifecycle?
Answer explanation
DevSecOps refers to Development and Security Operations, which integrates security within the development, integration, and maintenance lifecycle.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An implementation engineer is looking to understand how to configure security in SELinux. What are the three different modes that define how SELinux applies in a system?
Answer explanation
Enforcing, Permissive, and Disabled are the three modes that SELinux uses. In enforcing mode, SELinux is enabled and policies are enforced. In Permissive mode, SELinux is enabled, but policies are not enforced. In Disabled mode, SELinux is turned off system-wide.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users report that a recently published application installer is blocked by their operating system. What can the developer add to the installation package to ensure it installs correctly?
Answer explanation
A digital signature is a unique hash used to determine if a downloaded file is the same as the developer intended.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What entity is responsible for issuing valid certificates?
Answer explanation
A certificate authority oversees issuing of certificates. They are vested with the responsibility of issuing certificates in an ethical manner.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company recently switched from SELinux to AppArmor. What command would allow the company to place a profile in a mode that requires its enablement?
Answer explanation
AppArmor has multiple commands. Each executable can have an associated AppArmor profile. The command aa-enforce is used in AppArmor to place a profile in enforce mode. The basic syntax is aa-enforce {path to profile}.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security-focused web application company implemented and enforced the use of a secondary, one-time token in addition to a username and password to access their website. What security concept does this refer to?
Answer explanation
Multifactor authentication is a second form of password separate from a user's main username and password. It typically is a rotating six-digit password that refreshes every 30-seconds.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which context-based permissions scheme was developed by the National Security Agency?
Answer explanation
The U.S. National Security Agency (NSA) developed security-Enhanced Linux (SELinux), the default context-based permissions scheme provided with CentOS and Red Hat Enterprise Linux, and is available on other distributions.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?