A systems administrator is configuring SELinux on a low-resource embedded device. The administrator needs to apply a basic level of mandatory access control without loading the full set of policies for common network services. Which SELinux policy type would be the most appropriate choice for this scenario?
The 'minimum' SELinux policy is the correct choice. It is a minimal version of the targeted policy, designed for systems with limited resources or for administrators who wish to build a highly customized policy. It installs only a base policy package, leaving most processes unconfined by default. The 'targeted' policy is more comprehensive, confining many network-facing daemons, and is the default for general-purpose systems but may be too resource-intensive for this scenario. The 'mls' (Multi-Level Security) policy is a much stricter policy used for environments requiring labeled security, which is not what the scenario describes. 'unconfined' refers to a domain within a policy, not a policy type itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SELinux and how does it function?
Open an interactive chat with Bash
How does the 'minimum' policy differ from the 'targeted' and 'mls' policies?
Open an interactive chat with Bash
What is the significance of leaving most processes unconfined by default in the 'minimum' SELinux policy?