informatica:certificaciones:lpic:lpic-2:212_system_security
Diferencias
Muestra las diferencias entre dos versiones de la página.
| Ambos lados, revisión anteriorRevisión previaPróxima revisión | Revisión previa | ||
| informatica:certificaciones:lpic:lpic-2:212_system_security [2021/04/19 15:13] – tempwin | informatica:certificaciones:lpic:lpic-2:212_system_security [2021/04/20 17:07] (actual) – [Recomendaciones] tempwin | ||
|---|---|---|---|
| Línea 28: | Línea 28: | ||
| * Conocer los modos de funcionamiento OpenVPN. | * Conocer los modos de funcionamiento OpenVPN. | ||
| * Establecer un túnel punto a punto OpenVPN. | * Establecer un túnel punto a punto OpenVPN. | ||
| + | |||
| + | **When the default policy for the iptables INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?** | ||
| + | |||
| + | * All traffic to localhost must always be allowed. | ||
| + | * It doesn' | ||
| + | * Sendmail delivers emails to localhost. | ||
| + | * Some applications use the localhost interface to communicate with other applications. (**Solución**) | ||
| + | * '' | ||
| + | |||
| + | El interfaz // | ||
| + | |||
| + | **To be able to access the server with the IP address 10.12.34.56 using HTTPS, a rule for iptables has to be written. Given that the client host's IP address is 192.168.43.12, | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | La regla '' | ||
| + | |||
| + | **What security precautions must be taken when creating a directory into which files can be uploaded anonymously using FTP?** | ||
| + | |||
| + | * The directory must not have the execute permission set. | ||
| + | * The directory must not have the read permission set. (**Solución**) | ||
| + | * The directory must not have the read or execute permission set. | ||
| + | * The directory must not have the write permission set. | ||
| + | * The directory must not contain other directories. | ||
| + | |||
| + | Si no tiene permisos de lectura, el usuario " | ||
| + | |||
| + | **Which THREE of the following actions should be considered when a FTP chroot jail is created?** | ||
| + | |||
| + | * Create ''/ | ||
| + | * Create ''/ | ||
| + | * Create ''/ | ||
| + | * Create the user '' | ||
| + | * Create ''/ | ||
| + | |||
| + | **A security-conscious administrator would change which TWO of the following lines found in an SSH configuration file?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | El protocolo 1 de SSH no es seguro. Tampoco es seguro permitir el acceso de root por SSH. | ||
| + | |||
| + | **When connecting to an SSH server for the first time, its fingerprint is received and stored in a file, which is located at:** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | Guardamos la huella del servidor en el equipo del cliente. | ||
| + | |||
| + | **What tool scans log files for unsuccessful login attempts and blocks the offending IP addresses with firewall rules?** | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **What is the name of the network security scanner project which, at the core, is a server with a set of network vulnerability tests (NVTs)?** | ||
| + | |||
| + | * nmap | ||
| + | * OpenVAS (**Solución**) | ||
| + | * Snort | ||
| + | * wireshark | ||
| + | |||
| + | **Which directive in the OpenVPN client.conf specifies the remote server and port that the client should connect to? (Provide only the directive, without any options or parameters)** | ||
| + | |||
| + | * '' | ||
| + | |||
| + | **What types of virtual network devices does OpenVPN use for connections? | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | Los modos **point-to-point** y **site-to-site** utilizan los dispositivos '' | ||
| + | |||
| + | **Which of the following address ranges are PRIVATE address ranges? (Choose all that apply.) | ||
| + | Choose the 3 correct answers:** | ||
| + | |||
| + | * 172.16.0.0 to 172.31.255.255 (**Solución**) | ||
| + | * 192.168.0.0 through 192.168.255.255 (**Solución**) | ||
| + | * None of the above | ||
| + | * 10.0.0.0 to 10.255.255.255 (**Solución**) | ||
| + | |||
| + | **Which of the following files is the primary configuration file for the VSFTPD service?** | ||
| + | |||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | * ''/ | ||
| + | |||
| + | **Which of the following kernel settings, when added to the file / | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | **The ' | ||
| + | |||
| + | * Verdadero (**Solución**) | ||
| + | * Falso | ||
| + | |||
| + | **The ' | ||
| + | |||
| + | * Verdadero (**Solución**) | ||
| + | * Falso | ||
informatica/certificaciones/lpic/lpic-2/212_system_security.1618838006.txt.gz · Última modificación: por tempwin
