Topic 212: System Security

Perteneciente a LPIC-2

Módulos:

Recomendaciones

De cara al examen, habría que tener claro:

When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

El interfaz loopback es un interfaz virtual de red que hace una autoreferencia para que determinadas aplicaciones puedan comunicarse por red a nivel local.

To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host's IP address is 192.168.43.12, which of the following commands is correct?

La regla INPUT se debería descartar porque hace referencia a paquetes que entran en el firewall y no entre dos máquinas de dos redes dentro de nuestra red interna.

What security precautions must be taken when creating a directory into which files can be uploaded anonymously using FTP?

Si no tiene permisos de lectura, el usuario “anónimo” no podría consultar qué más archivos hay en el directorio.

Which THREE of the following actions should be considered when a FTP chroot jail is created?

A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?

El protocolo 1 de SSH no es seguro. Tampoco es seguro permitir el acceso de root por SSH.

When connecting to an SSH server for the first time, its fingerprint is received and stored in a file, which is located at:

Guardamos la huella del servidor en el equipo del cliente.

What tool scans log files for unsuccessful login attempts and blocks the offending IP addresses with firewall rules?

What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests (NVTs)?

Which directive in the OpenVPN client.conf specifies the remote server and port that the client should connect to? (Provide only the directive, without any options or parameters)

What types of virtual network devices does OpenVPN use for connections? (Choose TWO corrects answers.)

Los modos point-to-point y site-to-site utilizan los dispositivos tun. tap se utiliza en bridge.

Which of the following address ranges are PRIVATE address ranges? (Choose all that apply.) Choose the 3 correct answers:

Which of the following files is the primary configuration file for the VSFTPD service?

Which of the following kernel settings, when added to the file /etc/sysctl.conf, will enable a Linux system to function as a router (forwarding IP packets)?

The 'scp' and 'sftp' services are encrypted in the same manner as SSH and can utilize the same public/private keys for user authentication.

The 'ssh-keygen' utility is used to generate public and private keys that can be exchanged with remote systems to authenticate the user that generated them during SSH connections.