PrepAway - Latest Free Exam Questions & Answers

Tag: Google can also be used to detect the presence of many Web-enabled network devices

Whathas Giles discovered on Tommy’s computer?

Giles is the network administrator for his company, a graphics design company based in Dallas. Most of the network is comprised of Windows servers and workstations, except for some designers that prefer to use MACs. These MAC users are running on the MAC OS X operating system. These MAC users also utilize iChatto talk between each other. Tommy, one of these MAC users, calls Giles and saysthat his computer is running very slow. Giles then gets more calls from the other MAC users saying they are receiving instant messages from Tommy even when hesays he is not on his computer. Giles immediately unplugs Tommy’s computer fromthe network to take a closer look. He opens iChat on Tommy’s computer and it says that it sent a file called latestpics.tgz to all the other MAC users. Tommy says he never sent those files. Giles also sees that many of the computer’s applications appear to be altered. The path where the files should be has an altered file and the original application is stored in the file’s resource fork. Whathas Giles discovered on Tommy’s computer?

What tool is Cheryl using to monitor the company’s external websites?

Cheryl is a security analyst working for Shintel Enterprises, a publishing company in Boston. As well as monitoring the security state of the company’s network, she must ensure that the company’s external websites are up and running all the time. Cheryl performs some quick searches online and finds a utility thatwill display a window on her desktop showing the current uptime statistics of the websites she needs to watch. This tool works by periodically pinging the websites; showing the ping time as well as a small graph that allows Cheryl to viewthe recent monitoring history. What tool is Cheryl using to monitor the company’s external websites?