Which type of network attack is in progress?
You work as the security administrator at Certkiller .com. While monitoring network traffic, you find
that your domain name server is resolving the domain name to the incorrect IP (Internet Protocol)
address. You discover that Internet traffic is being misdirected. You immediately suspect that an
intruder has launched a malicious attack against the network. Which type of network attack is in
progress?
Which of the following would be MOST important when designing a security awareness program?
Which of the following would be MOST important when designing a security awareness program?
Which of the following should MOST likely be installed to meet the user’s requirements?
A user needs a new gaming computer which can be both fast and quiet. Which of the following
should MOST likely be installed to meet the user’s requirements?
What will you answer him?
You are working as a network technician at Certkiller .com. A user calls and asks what a sign of a
malfunctioning battery in a laptop could be. What will you answer him?
what default traps to look for?
Which of the following indicates to an SNMP (Simple Network Management Protocol) manager
what default traps to look for?
CORRECT TEXT The ________ command is used to add a group to the system.
CORRECT TEXT
The ________ command is used to add a group to the system.
Which Security method is used to insure that a particular host only has access to a particular LUN?
Which Security method is used to insure that a particular host only has access to a particular
LUN?
Which RAID level is the most commonly used for file servers, application server, web server, databases, and ot
Which RAID level is the most commonly used for file servers, application server, web server,
databases, and other transaction-oriented applications?
Which of the following documents should the team member consult?
The project is behind schedule. A project team member has analyzed the work performance
information and has not created the weekly status update because they are uncertain when the
update should be completed. Which of the following documents should the team member consult?
Which of the following, by default, would be the BEST choice to accomplish this goal?
A network consists of various remote sites that connect back to two main locations. The security
administrator needs to block TELNET access into the network. Which of the following, by default,
would be the BEST choice to accomplish this goal?