what additional service does the router and the Kerberos server use in implementing Kerberos authentication on
Besides Kerberos port traffic, what additional service does the router and the Kerberos server use in implementing Kerberos authentication on the router?
what well-known ports are used for DNS?
According to RFC 1700, what well-known ports are used for DNS?
what is the definition of exploit signatures?
In the context of intrusion detection, what is the definition of exploit signatures?
What file on the Unix system would need to be modified to allow the copying to occur?
A network manager issues an RCP (Remote Copy) when copying a configuration from a router to a Unix system. What file on the Unix system would need to be modified to allow the copying to occur?
which one of the routers would forward a packet destined for 10.1.1.1?
Exhibit:
10.1.1.0/24 through OSPF
10.1.0.0/16 through EIGRP
10.1.0.0&16 static
If a router had the three routers listed, which one of the routers would forward a packet destined for 10.1.1.1?
Which of the following does NOT qualify to be an example of a supported ISAKMP keying mechanism?
Which of the following does NOT qualify to be an example of a supported ISAKMP keying mechanism?
how many IPSec security associations should be active on the system?
Under normal circumstances, after a single IPSec tunnel has been established, how many IPSec security associations should be active on the system?
Which of the following is an invalid Cisco Secure Intrusion Detection System function?
Which of the following is an invalid Cisco Secure Intrusion Detection System function?
what is the expected behavior when User_A attempts to edit.D:word.doc?
User_A and User_B are logged into Windows NT Workstation Host_A and Host_B respectively.
All users are logged in to the domain”CORP”.
All users run a logon script with the following line: “net useD:\CORPSVRdata”
– User_A and User_B are both members of the local group “USERS”.
– Local group “USERS” is includes in global group “DOMAIN USERS”.
– All users, hosts, and groups are in the domain “CORP”.
– The directory \CORPSVRdata has the share permission for local group “USERS” set to “No Access”.
– The Microsoft Word document \CORPSVRdataword.doc has file permissions for local group
“USERS” set to “Full Control”.
– The Microsoft Word document \CORPSVRdataword.doc is owned by User_B. Given this scenario on a
Windows NT 4.0 network, what is the expected behavior when User_A attempts to edit
D:word.doc?
How can this Java filter be circumvented?
Some packet filtering implementations block Java by finding the magic number 0xCAFEBABE at the beginning of documents returned via HTTP.How can this Java filter be circumvented?