Which port will you block at the Firewall?
Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are
primarily
Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up
a mail server in a production environment for internal use only. You do not want this mail server to
receive any requests from anywhere but the internal network. Therefore you have decided to block
incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?
What is the objective of the Security Management process?
What is the objective of the Security Management process?
Which one of the following standards is concerned primarily with security?
Which one of the following standards is concerned primarily with security?
Which one of the following is NOT a valid purpose or objective of problem management?
Which one of the following is NOT a valid purpose or objective of problem management?
which of the following?
In order to obtain public IP addresses, Internet Service Providers (ISPs) contact their upstream
registry or their appropriate regional registry (an IANA subsidiary) at which of the following?
What is the decimal equivalent of the following binary IP address: 11001111.10001010.01101101.01110001
You are training some network administrators to analyze log files. Some of the logs present IP
addresses in binary. You explain the usefulness of reading addresses in multiple formats. You
demonstrate several conversions between decimal and binary. What is the decimal equivalent of
the following binary IP address:
11001111.10001010.01101101.01110001
What is the most common process that is associated with the Service Desk?
What is the most common process that is associated with the Service Desk?
Which of the following defines a lifecycle that is split into four quadrants (optimizing, changing, supporting
Which of the following defines a lifecycle that is split into four quadrants (optimizing, changing,
supporting and operating)?
Which one of the following activities is NOT part of the Deming Cycle?
Which one of the following activities is NOT part of the Deming Cycle?
you need to implement an update based on a critical Microsoft Security Bulletin?
You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS
6.0.
You are concerned about the overall security of your servers, and are checking with Microsoft for
any patches or updates that you might need to apply to your systems. Which of the following
would you apply if you need to implement an update based on a critical Microsoft Security
Bulletin?