What is according to ISO/IEC 20000 a required part of the planning for new or changed services?
What is according to ISO/IEC 20000 a required part of the planning for new or changed services?
Which of the following would commonly be found in a contract underpinning an IT service?
Which of the following would commonly be found in a contract underpinning an IT service?
1. Financial arrangements related to the contract
2. Description of the goods or service provided
3. Responsibilities and dependencies for both parties
What is the function of the HFNetChk tool, available with MBSA?
Microsoft has developed several security tools to help you with the security and configuration of
the systems in your network. One of these tools is the Microsoft Security Baseline Analyzer
(MBSA). In the command line options of the MBSA is the HFNetChk tool. What is the function of
the HFNetChk tool, available with MBSA?
what will the SEQ and ACK values be for the initializing packet?
Recently you feel your network has been attacked by people sending out of spec packets to your
firewall
in order to get past the firewall rules. You have decided that you will capture all the packets on the
firewall segment with network monitor to analyze the TCP headers for proper use. If you capture a
packet that is the first part of a legitimate three way handshake between two Windows 2000
professional computers, what will the SEQ and ACK values be for the initializing packet?
Which one of the following activities would be performed by access management?
Which one of the following activities would be performed by access management?
Which of the following would you not perform to harden this system?
You just installed a new SuSe Linux web server, running Apache, and are in the process of
hardening the server. The server will perform basic web services, static web pages to internal
clients only. Which of the following would you not perform to harden this system?
what is the function of the first eight bits?
During a network packet capture in Wireshark, you capture ICMP traffic, and are analyzing this
capture.
In an ICMP Message, what is the function of the first eight bits?
What does the standard explicitly recommend to be implemented with Configuration Management?
What does the standard explicitly recommend to be implemented with Configuration
Management?
Which one of the following provides the CORRECT list of processes within the service operation stage of the se
Which one of the following provides the CORRECT list of processes within the service operation
stage of the service lifecycle?
How many DNS servers would have to be compromised to have complete control of the Internet DNS?
One of the major benefits to the design of the Internet is the redundancy that is built-in. To provide
a measure of fault tolerance for DNS on the Internet, the designers of the Domain Name System
distributed the root servers in various countries around the world. If an attacker were to attempt to
disable DNS, they would have to gain administrative access on all the root servers. How many
DNS servers would have to be compromised to have complete control of the Internet DNS?