which of the following resources demands the highest level of security on the network?
In a typical corporate environment, which of the following resources demands the highest level of
security on the network?
Why would a Windows NT/2000 administrator place the operating system, the program files and the data on differ
Why would a Windows NT/2000 administrator place the operating system, the program files and
the data on different, discrete directories?
What is the name of the risk assessment stage in which you bypass login accounts and passwords?
What is the name of the risk assessment stage in which you bypass login accounts and
passwords?
Which of the following is the correct term for this activity?
Tavo is documenting all of his network attributes. He wants to know the type of network-level
information that is represented by the locations of access panels, wiring closets and server rooms.
Which of the following is the correct term for this activity?
which step are you conducting when you determine whether the network can differentiate itself from other netwo
While assessing the risk to a network, which step are you conducting when you determine whether
the network can differentiate itself from other networks?
Which type of attack does this action help to prevent?
Lucy obtains the latest stable versions of servers, services or applications. Which type of attack
does this action help to prevent?
What is the most secure policy for a firewall?
What is the most secure policy for a firewall?
Which type of attack uses a database or databases to guess a password in order to gain access to a computer sy
Which type of attack uses a database or databases to guess a password in order to gain access to
a computer system?
What are the most secure permissions you would apply to this file?
You must apply permissions to a file named /projects/group1/myfile.txt, and you need to fulfill the
following requirements:
You want full access to the file.
People in your group should be able to read the file.
People in your group should not be able to write to the file.
People outside of your group should be denied access to the file.
What are the most secure permissions you would apply to this file?
Which service, command or tool discovers the IP addresses of all computers or routers between two computers on
Which service, command or tool discovers the IP addresses of all computers or routers between
two computers on an Internet/intranet network?