What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?
Answer : B
Which of the following is an UDP based protocol?
Answer : B
Which of the following is used to allow or deny access to network resources?
Answer : B
You ask your system administrator to verify user compliance with the corporate policies on password strength, namely that all passwords will have at least one numeral, at least one letter, at least one special character and be 15 characters long. He comes to you with a set of compliance tests for use with an offline password cracker. They are designed to examine the following parameters of the password:
* they contain only numerals
* they contain only letters
* they contain only special characters
* they contain only letters and numerals
" they contain only letters and special characters
* they contain only numerals and special characters
Of the following, what is the benefit to using this set of tests?
Answer : B
When a host on a remote network performs a DNS lookup of www.google.com, which of the following is likely to provide an Authoritative reply?
Answer : A
Which of the following protocols is used to send e-mails on the Internet?
Answer : A
What is the motivation behind SYN/FIN scanning?
Answer : B
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.
Answer : ABC
Which of the following statements about DMZ are true?
Each correct answer represents a complete solution. Choose two.
Answer : AC
You work as a Network Administrator for World Perfect Inc. The company has a Linux- based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?
Answer : A
What type of formal document would include the following statement?
Employees are responsible for exercising good judgment regarding the reasonableness of personal use. Individual departments are responsible for creating guidelines concerning personal application of Internet/Intranet/Extranet systems. In the absence of such policies, employees should be guided by departmental policies, and if there is any uncertainty, employees should consult their supervisor or manager.
Answer : C
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Answer : C
What is the discipline of establishing a known baseline and managing that condition known as?
Answer : C
Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?
Answer : A
You work as a Network Administrator for Secure World Inc. The company has a Linux- based network. You want to run a command with the changed root directory. Which of the following commands will you use?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us