2.1 Summarize the purpose and use the security best practices in a Linux environment Flashcards
1
Q
Self-signed certificate
A
In some cases, the server itself provides the signature.
2
Q
Certificate Authorities
A
A CA is a third party that is checked against your digital certificate to make sure you’re legit.
3
Q
Pluggable Authentication Modules
A
PAM are a set of config files that Linux applications use to authenticate users and enforce requirements for users to authenticate.
4
Q
System Security Services Daemon(SSSD)
A
SSSD is designed to provide an authenticated method to access remote servers.
5
Q
Secure Boot(UEFI)
A
Secure boot takes extra steps to make sure that the boot images are not corrupted or malicious.