What is the objective of the Service Continuity and Availability Management processes?
What is the objective of the Service Continuity and Availability Management processes?
Which of the following can you do to have the application execute, and not have the security of the system low
The computer you are currently using is running Linux, and you are logged into the system with
your normal user account. An application you wish to run requires root access to execute. Which
of the following can you do to have the application execute, and not have the security of the
system lowered?
which of the following?
You have found a user in your organization who has managed to gain access to a system that this
user was not granted the right to use. This user has just provided you with a working example of
which of the following?
What should be ensured as part of these activities?
A group of activities within Release Management is roll-out, distribution and installation. What
should be ensured as part of these activities?
Where is the umask setting located?
You have decided to alter the default permissions of files on your SuSe Linux system. To do so,
you are going to change the umask settings. Where is the umask setting located?
What is the function of BASE on your Snort machine?
You have configured Snort and MySQL on your SuSe Linux machine. You wish to enhance the
system by using BASE. What is the function of BASE on your Snort machine?
What is the best way that management can make this visible?
Top management has to provide evidence of its commitment to developing, implementing and
improving its Service Management capability within the context of the organization’s business and
Customers’ requirements. What is the best way that management can make this visible?
Which of the following pieces of information are found in the Inode, on a Linux system?
Which of the following pieces of information are found in the Inode, on a Linux system?
which of the following programs?
You are going to add another computer to the pool that you use for detecting intrusions. This time
you are making a customized Snort machine running on Windows Server 2003. Prior to running
Snort you must install which of the following programs?
Which of the following tools will allow you to accomplish your task?
You wish to manage your Linux system remotely, using a web browser. Which of the following
tools will allow you to accomplish your task?