Which of the following programming techniques should be used to prevent buffer overflow attacks?
Which of the following programming techniques should be used to prevent buffer overflow
attacks?
Which of the following technologies allows a single piece of hardware to host multiple operating systems simul
Which of the following technologies allows a single piece of hardware to host multiple operating
systems simultaneously?
how should security patches and security hot fixes be applied?
An extremely destructive worm has been reported by major vendors and patches are available to
prevent security breaches. According to BEST practices, how should security patches and security
hot fixes be applied?
Which command will create a complete report that you can analyze for changes that may be security-related?
After a minor security incident you are instructed by your lead sys-admin to verify the RPMs
installed on a running system. Which command will create a complete report that you can analyze
for changes that may be security-related?
Which login communication session would you analyze in the trace log for the number of flow control credits th
You are looking at a Fibre Channel trace log and you notice that the class 2 communication
session between one initiator and target continually stops and then restarts. You suspect that
there is a flow control problem between this pair of devices. Which login communication session
would you analyze in the trace log for the number of flow control credits that have been allocated?
What is the cause of the errors?
You are trying to upgrade an existing 1Gb/s FC SAN that is using 62.5 micron multi-mode cable
from a tape library to a server that is 175 meters away to 2Gb/s Fibre Channel. After switching to
the 2Gb/s Fibre Channel equipment, a connection to the server cannot be maintained. When a
connection is made, numerous errors are reported. What is the cause of the errors?
Which of the following risk responses is the project manager using?
A hurricane is forecasted near the corporations call center. The project manager has arranged for
a redundant call center in another location to accept calls if the corporate call center is unable to
receive calls. Which of the following risk responses is the project manager using?
Which of the following must a security administrator do when the private key of a web server has been compromi
Which of the following must a security administrator do when the private key of a web server has
been compromised by an intruder?
Which of the following is the BEST way to correct this problem?
An IT manager is concerned about server administrators having to be cross-trained to work on
every server. Which of the following is the BEST way to correct this problem?
What must be done so that the Microsoft Windows 2000 servers can access the Novell NetWare 4.0 server?
A companys network currently has three Microsoft Windows 2000 servers. A Novell NetWare 4.0
server is added, but none of the Microsoft Windows 2000 servers can access the Novell server.
What must be done so that the Microsoft Windows 2000 servers can access the Novell NetWare
4.0 server?