what is the command that is used for changing the context of a file?


With SELinux, what is the command that is used for changing the context of a file? (Specify thecommand only, with path information or arguments)

What does the message mean?

An unprivileged user issued a command which produced the following log message:avc: denied { getattr } for pid=984 exe=/usr/bin/vim path=/etc/shadow dev=03:01 ino=134343scontext=hugh:user_r:user_t tcontext=system_u:object_r:shadow_t tclass=fileWhat does the message mean?

what is the format of SELinux security context which will assign the user_r role and the user_t domain to their login sessions?

When a user logs into a system using SSH, what is the format of SELinux security context which willassign the user_r role and the user_t domain to their login sessions?

How are SELinux permissions related to standard Linux permissions?

How are SELinux permissions related to standard Linux permissions?

What command will run a new shell for the user in the new context?

A user that is allowed to use the su command under SELinux is also allowed to switch from the userrole to the sysadmin role. What command will run a new shell for the user in the new context?(Specify the command only, with path, options or arguments)


What is the difference between an SELinux domain and an SELinux type?

What is the difference between an SELinux domain and an SELinux type?

How should the corresponding configuration entry be formatted?

An SELinux security context is required to ensure that all files in /opt have the default context ofsystem_u:object_r:usr_t. How should the corresponding configuration entry be formatted?

Specifying the ___________ parameter in sshd_config will allow the administrator to systematically provide access to certain user accounts by name

Specifying the ___________ parameter in sshd_config will allow the administrator to systematicallyprovide access to certain user accounts by name.

which TWO parameters in sshd_config?

An administrator can prevent dictionary based attacks against an OpenSSH server by forcingkeybased authentication with which TWO parameters in sshd_config?

What does this indicate?

A user is attempting to connect to a remote server via SSH and receives the following message:The authenticity of host ‘mail.example.com (208.77.188.166)’ can’t be established.RSA key fingerprint is 92:32:55:e9:c4:20:ae:1b:2c:d7:91:40:90:89:1c:ad.Are you sure you want to continue connecting […]



Page 5 of 11« First...34567...10...Last »