which of the following is true?
At the root@linuxbox$ prompt on a Linux machine you type ls -l b.doc and the output reads:
-rw-rw-r–1 simonusers31337Oct 5 11:21 b.doc
According to this output, which of the following is true?
What is the name of that configuration file?
After installing Snort on your Windows machine that is destined to be your IDS, you need to edit
the configuration file to customize it to your needs. What is the name of that configuration file?
What is required to be included in proposals for new or changed services according to ISO/IEC 20000?
What is required to be included in proposals for new or changed services according to ISO/IEC
20000?
which of the following?
You are running a Linux Server for your organization. You realize after a security scan that the
Telnet service is accepting connections, which you do not want. In order to disable the computers
ability to accept incoming Telnet sessions, the easiest method for you to choose is which of the
following?
What are the two basic forms of firewall implementations?
You have recently been contracted to implement a new firewall solution at a client site. What are
the two basic forms of firewall implementations?
What purpose can the ISO/IEC 20000 standard serve?
What purpose can the ISO/IEC 20000 standard serve?
which of the following computers will implement IPSec method 4?
In Windows Server 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic
security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
will implement IPSec method 4?
which of the following programs?
You are going to add another computer to the pool that you use for detecting intrusions. This time
you are making a customized Snort machine running on Windows 2000 Professional. Prior to
running Snort you must install which of the following programs?
Which of the following is the reason that this is not the case?
In your Windows 2003 Active Directory enabled network it has been decided that Dynamic DNS
will be implemented. Once implemented this should help to minimize IP address to name mapping
issues. One of your assistants wonders if using DDNS will present a single point of failure for the
network. Which of the following is the reason that this is not the case?
you need to create a rule that will be based upon a Network Set, which of the following would you select in th
You have recently installed ISA Server 2006 as your firewall, and are building some new rules. If
you need to create a rule that will be based upon a Network Set, which of the following would you
select in the Toolbox?