DRAG DROP
John works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating system. He installs an application on his computer. The application is not running properly. Therefore, he wants to
disable the application.
What steps will he take to accomplish the task?
Select and Place:
You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file.
Which of the following commands will you use to accomplish the task?
A. wc -c file1.txt >>error.txt
B. wc -c file1.txt 1>error.txt
C. wc -c file1.txt 2>error.txt
D. wc -c file1.txt >error.txt
Which of the following is a technique for creating Internet maps? (Choose two)
A. AS PATH Inference
B. Object Relational Mapping
C. Active Probing
D. Network Quota
You work as a Network Administrator for Infonet Inc. The company's network has an FTP server. You want to secure the server so that only authorized users can access it.
What will you do to accomplish this?
A. Disable anonymous authentication.
B. Stop the FTP service on the server.
C. Disable the network adapter on the server.
D. Enable anonymous authentication.
Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. He wants to use frames in the Web site.
Which of the following is an HTML tag used to create frames?
A.
B.
C.
D.
Which of the following types of firewall functions at the Session layer of OSI model?
A. Packet filtering firewall
B. Circuit-level firewall
C. Switch-level firewall
D. Application-level firewall
Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time.
Which of the following options will he choose to accomplish the task?
A. User cannot change password
B. Delete temporary password at next logon
C. User must change password at next logon
D. Password never expires
Which of the following commands can you use to search a string 'pwd' in all text files without opening them? (Choose two)
A. vi
B. grep
C. sed
D. locate
You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN.
Which of the following is the required information that you will need to configure the client computer? (Choose two)
A. SSID of the WLAN
B. WEP key
C. IP address of the router
D. MAC address of the router
Which of the following types of firewall ensures that the packets are part of the established session?
A. Stateful inspection firewall
B. Switch-level firewall
C. Circuit-level firewall
D. Application-level firewall
You are the Network Admin for a company. You are concerned about users having access to items they should not. Your concern is that they may inadvertently have been granted access to those resources. When conducting a user access and rights review, which of the following is most likely to show you such unintentional granting of user rights?
A. IDS Logs
B. Access Control Lists
C. Server logs
D. Group Membership
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
It is Linux-based WLAN WEP cracking tool that recovers encryption keys.
It operates by passively monitoring transmissions.
It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.
Which of the following tools is John using to crack the wireless encryption keys?
A. Cain
B. PsPasswd
C. Kismet
D. AirSnort
Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?
A. tac
B. tr
C. cat
D. less
Which of the following statements about system hardening are true? (Choose two)
A. It is used for securing the computer hardware.
B. It can be achieved by installing service packs and security updates on a regular basis.
C. It can be achieved by locking the computer room.
D. It is used for securing an operating system.
You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server.
What should be your highest priority then in checking his network?
A. Setting up a honey pot
B. Vulnerability scanning
C. Setting up IDS
D. Port scanning