what switch must you use?
If you wish to change the permissions of a parent directory in your Linux system, and want the
permissions to be changed on the files and subdirectories in the parent directory to be the same,
what switch must you use?
what will the responding computer use as an ACK?
During your packet capture of traffic to check if your network is getting hit by a Denial of Service
attack, you analyze TCP headers. You notice there are many headers that seem to have the same
SEQ number, with the responding computer using different SEQ and ACK numbers in response. If
you are analyzing a normal three-way handshake between two Windows 2000 nodes, and the first
packet has a SEQ of
0xD36077AF, what will the responding computer use as an ACK?
Which of the following answers lists proper RPM commands, with the correct description of the command?
You are working with some new RPM files on your Linux system. You know there are several
options when dealing with RPM files. Which of the following answers lists proper RPM commands,
with the correct description of the command?
What is the sequence number used by TCP for the second part of the three way handshake?
which of the following computers must implement IPSec method 3?
In Windows 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
must implement IPSec method 3?
Which of the following are parts of the TCP header?
During a security review of the network it is decided to run a full packet capture over a 24 hour
period and log the packets for analysis. You have been chosen to analyze all the TCP packets. To
prepare you study the RFC for TCP and have identified all the parts of the TCP header. Which of
the following are parts of the TCP header?
What is the SAM?
You are the main person responsible for the security of a mid-sized company. To have control
over all the aspects of the security of the network, you study and analyze each component
thoroughly. Your network is running all Windows 2003 servers, and you are studying the logon
process. You know there are many components of the process, and are now at the point where
you are analyzing the Security Accounts Manager (SAM). What is the SAM?
You tell him it identifies the IP Protocol known as?
what type of traffic did Snort capture in this log file?
What combination of the following is required to create a TCP/IP socket?
It is a given that two computers that communicate using TCP/IP as the protocol must use valid
addresses and media to do so. What combination of the following is required to create a TCP/IP
socket?