A. -tls- timeout 500
B. -tls-timeout 5
C. -tls- timer 5
D. -tls- timer 500
A. ntop --reset-password=testing 123
B. ntop --set-new-password=testing123
C. ntop --set-admin-password=testing123
D. ntop --set-password-testing123
A. private keys should be uploaded to public key servers.
B. Private keys should be included in X509 certificates.
C. Private keys should always be stored as plain text files without any encryption.
D. Private keys should be created on the systems where they will be used and should never leave them.
E. Private keys should have a sufficient length for the algorithm used for key generation.
A. shadow
B. passwd
C. host
D. service
E. group
A. It displays statistics from the running Snort process.
B. It returns the status of all configured network devices.
C. It reports whether the Snort process is still running and processing packets.
D. It reads syslog files containing Snort information and generates port scan statistics.
E. It displays the status of all Snort processes.
A. Symbolic links to data outside the chroot path are followed, making files and directories accessible
B. Programs are not able to set a chroot path by using a function call, they have to use the command chroot
C. When using the command chroot, the started command is running in its own namespace and cannot communicate with other processes
D. The chroot path needs to contain all data required by the programs running in the chroot environment
E. Hard links to files outside the chroot path are not followed, to increase security