2.1 Summarize the purpose and use the security best practices in a Linux environment Flashcards

1
Q

Self-signed certificate

A

In some cases, the server itself provides the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certificate Authorities

A

A CA is a third party that is checked against your digital certificate to make sure you’re legit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pluggable Authentication Modules

A

PAM are a set of config files that Linux applications use to authenticate users and enforce requirements for users to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System Security Services Daemon(SSSD)

A

SSSD is designed to provide an authenticated method to access remote servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Boot(UEFI)

A

Secure boot takes extra steps to make sure that the boot images are not corrupted or malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly