wk1 security Flashcards
Which of the following are produced and supported by cPanel? Select one: a. cPSecure b. cPHulk c. I don't know. d. CSF e. Fail2Ban
cPHulk
Select all the Security Policy Items found in WHM. Select all that apply.
Select one or more:
a. Password Frequency
b. I don’t know.
c. Password Strength
d. Two-Factor Authentication
e. Host access control
f. Brute Force Protection (CPHulk)
g. CSF
h. Google Authenticator
i. Password Age
j. Force SSL
k. Limit logins to Verified IP addresses
Password Age, Two-Factor Authentication, Password Strength, Limit logins to Verified IP addresses
Jailshell uses VirtFS uses what kind of mounts to provide users access to command-line utilities?
Select one:
a. bind
b. I don’t know.
c. unbound
d. hard
e. soft
bind
What is the name of the vendor which provides the default ModSecurity Core Ruleset? Select one: a. I don't know. b. Trustwave c. cPanel d. OWASP e. Comodo
OWASP
When are you permitted to modify the firewall on a customers server?
Select one:
a. When you know the problem is with CSF.
b. When you need to test and see if the firewall is the problem.
c. When the user claims to be blocked out of their server and asks us to drop the firewall.
d. I don’t know.
e. When there is a cPanel provided script or WHM function that does the modification for you and you’ve received permission from a supervisor or level 3 analyst.
When there is a cPanel provided script or WHM function that does the modification for you and you’ve received permission from a supervisor or level 3 analyst
Why should VirtFS files and folders never be deleted by the root user?
Select one:
a. I don’t know.
b. These files and folders are hard links to system critical files and folders so deleting them will disable the system.
c. Under certain configurations, removing these files and folders can cause the user’s website to error.
d. Trick question - removing VirtFS files can free up lots of space and is perfectly fine to do.
e. These files and folders are required for mail delivery, so if you remove them the user will not be able to receive mail.
These files and folders are hard links to system critical files and folders so deleting them will disable the system.
Which Security operation needs to be enabled to be able to use verified IPs? Select one: a. I don't know. b. Tweak Settings c. Security Questions d. Require SSL e. Two-Factor Authentication
Security Questions