which of the following is true?
At the root@linuxbox$ prompt on a Linux machine you type ls -l b.doc and the output reads:
-rw-rw-r–1 simonusers31337Oct 5 11:21 b.doc
According to this output, which of the following is true?
which of the following?
You are running a Linux Server for your organization. You realize after a security scan that the
Telnet service is accepting connections, which you do not want. In order to disable the computers
ability to accept incoming Telnet sessions, the easiest method for you to choose is which of the
following?
which of the following computers will implement IPSec method 4?
In Windows Server 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic
security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
will implement IPSec method 4?
Which of the following is the reason that this is not the case?
In your Windows 2003 Active Directory enabled network it has been decided that Dynamic DNS
will be implemented. Once implemented this should help to minimize IP address to name mapping
issues. One of your assistants wonders if using DDNS will present a single point of failure for the
network. Which of the following is the reason that this is not the case?
which of the following?
You are configuring a complex set of policies in your Windows 2003 Active Directory network. You
have parent and child GPOs. If you do not want the child GPO to inherit policy from the parent
GPO, you would do which of the following?
Which of the following best describes the Secure Security Templates (SECURE*.INF)?
You are in the process of securing several new machine on your Windows 2003 network. To help
with the process Microsoft has defined a set of Security Templates to use in various situations.
Which of the following best describes the Secure Security Templates (SECURE*.INF)?
what mode will NTLMv2 be installed in?
You run an enterprise network for a large company. There are a few isolated branches in the
company, which do not connect to the main network. You wish to increase the security of those
branches by implementing NTLMv2. Since, those branches are in areas of the world where United
States Export
Restrictions are not met, what mode will NTLMv2 be installed in?
What do LM, NTLM, and NTLMv2 use as their Authentication method?
You are working on the configuration of the authentication systems used in your network, and are
considering several different authentication methods for your computer systems. What do LM,
NTLM, and NTLMv2 use as their Authentication method?
which of the following options would you use?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system,
if you wish to audit events like access to a file, folder, or printer, which of the following options
would you use?
which of the following options would you use?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system,
if you wish to audit events like the computer restarting, which of the following options would you
use?