What can she do to help secure her registry from changes?
Lucy wants to ensure that her Windows NT Server 4.0 and Windows 2000 systems do not incur any unauthorized changes. What can she do to help secure her registry from changes?
Which is included in the formula that Windows NT/2000 uses to create the Security Identifier?
Which is included in the formula that Windows NT/2000 uses to create the Security Identifier?
What type of attack is causing the system to slow down?
A computer on your network is responding very slowly to network requests, and then it stops responding at all. You use a packet sniffer and create a filter that views packets being sent to that host. You see that the host is receiving thousands of ICMP packets a minute. What type of attack is causing the system to slow down?
What is typically the most desirable asset for a hacker to obtain from a company or department?
What is typically the most desirable asset for a hacker to obtain from a company or department?
Which service, tool or command provides information about administrators, domain name servers, additional doma
Which service, tool or command provides information about administrators, domain name servers, additional domains and physical locations?
Which type of device communicates with external servers on behalf of internal clients?
Which type of device communicates with external servers on behalf of internal clients?
Which choice lists the components that form security descriptors for Windows NT/200 objects?
Which choice lists the components that form security descriptors for Windows NT/200 objects?
Which single service can you disable to stop approximately two-thirds of the exploration tools used against Wi
Which single service can you disable to stop approximately two-thirds of the exploration tools used against Windows NT/2000?
Which of the following must Helga’s rule contain?
Helga’s web server is placed behind her corporate firewall. Currently, her firewall allows only VPN connections from other remote clients and networks. She wants to open the internet-facing interface on her firewall so that it allows all users on the Internet to access her web server. Which of the following must Helga’s rule contain?
When assessing the risk to a machine or network, what step should you take first?
When assessing the risk to a machine or network, what step should you take first?
1D0-470