ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 9 - NS0-304 discussion

Report
Export

An administrator is configuring a Red Hat Enterprise Linux system as a Workload Security Agent and wants to make sure that it meets requirements.

Which two changes should the administrator make to the system? (Choose two.)

A.
Disable SELinux
Answers
A.
Disable SELinux
B.
Install the ansible-core application
Answers
B.
Install the ansible-core application
C.
Disable the system firewall
Answers
C.
Disable the system firewall
D.
Install the unzip application
Answers
D.
Install the unzip application
Suggested answer: A, D

Explanation:

When configuring a Red Hat Enterprise Linux system as a Workload Security Agent, there are specific system requirements and preparations needed to ensure compatibility and functionality of the security agent. Among the potential adjustments:

Disable SELinux: Security-Enhanced Linux (SELinux) can interfere with the operation of various security agents due to its strict access controls. Disabling SELinux may be recommended by certain security applications to ensure they can function without restrictions. This should be carefully considered in the context of overall system security policies.

Install the unzip application: Many security agents require unzip to extract and install necessary files. Ensuring that unzip is installed on the system can facilitate the installation and updating of the security agent.

Install the ansible-core application and Disable the system firewall are not typically required or recommended universally for configuring a Workload Security Agent:

Ansible-core is used for automation and configuration management but is not a prerequisite for most security agents unless specifically stated.

Disabling the system firewall can significantly reduce the system's security posture and is generally not advisable unless specifically required by the security agent, and even then, such advice should be critically evaluated.

For specific guidelines and requirements, the installation documentation of the Workload Security Agent should be consulted.

asked 23/09/2024
Lance Gentle
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first