_________________ uses hard disk and optical or tape jukebox technology to offer continuous online backup func
_________________ uses hard disk and optical or tape jukebox technology to offer continuous online backup functionality
Which of the following has the correct definition mapping?
Which of the following has the correct definition mapping?
Which of the following is not a proper characteristic of configuration management?
Which of the following is not a proper characteristic of configuration management?
Which of the following has an incorrect definition mapping?
Which of the following has an incorrect definition mapping?
i.Shareware is software that is publicly available free of charge and can be used, copied, studied, modified, and redistributed without restriction.
ii. Freeware is used by vendors to market their software.
iii. Commercial software is software that is sold for or serves commercial purposes
iv. Academic software is software that is provided for academic purposes at a reduced cost. It can be open source, freeware, or commercial software.
Which of the following would not fall under operation security?
Which of the following would not fall under operation security?
i. All hardware and software should be identified via asset management
ii. Configuration standards should be followed for all systems
iii. Devices, servers, and other hardware components should be kept in secured locations
iv. Acceptable Use policy should outlined acceptable software that users can install
__________________ is a method of taking over a Web user session by surreptitiously obtaining the session ID a
__________________ is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
Which of the following services does this port map to?
John finds in the company logs that there has been continuous scans on the company’s UDP port 53. Which of the following services does this port map to?
What is another name for this type of scan?
Tim is told to carry out a SYN scan on some potentially vulnerable systems. What is another name for this type of scan?
Every computer system has __________ TCP and ______________ UDP ports. The first _________ are said to be well
Every computer system has __________ TCP and ______________ UDP ports. The first _________ are said to be well-known ports.
Which of the following is the best reason that this is taking place?
Joyce is a network administrator for a large financial company. She has found out that email messages that her company’s employees are sending out are not getting to their intended destination. Which of the following is the best reason that this is taking place?