Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
A _____ is a fundamental component or container that holds information about all network resources that are grouped within it.a. workgroup
b. directory service
c. domain
d. forest
Answer
This answer is hidden. It contains 1 characters.
Related questions
Q:
List four mediums over which computer networks can transmit data.
Q:
List three common password options that are offered in the BIOS.
Q:
What six basic tasks does an operating system perform?
Q:
List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.
Q:
Match the following terms to the appropriate definitions.a. Attribute f. LSRRb. Buffer g. Macroc. Buffer overflow h. Source routingd. DoS attack i. Spoofinge. DDos attack j. Worm1/ Occurs when there is more data to store in a buffer than the buffer can hold2/ The address of the source computer is changed3/ A computer causes other computers to launch attacks directed at one or more targets4/ The sender of a packet specifies the precise path that a packet will take5/ A form of source routing that specifies only one portion of a route6/ A characteristic associated with a directory, folder, or file7/ Flooding a network with frames or packets containing errors8/ A program that replicates and replicates on the same computer9/ A storage area in a device that temporarily saves information in memory10/ A set of instructions for an activity that is performed frequently
Q:
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
Q:
Is a virus hoax a virus?
Q:
Does a locked computer operations room guarantee the protection of a network server?
Q:
Do the operating system device drivers coordinate operating system functions such as control of memory and storage?
Q:
What type of port might be used during a port-scanning attack?a. Serial b. Parallel c. UDPd. USB
Q:
Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.a. buffering b. denial of service c. wormsd. spoofing
Q:
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.a. Routers b. Proxy servers c. Network address translationd. Packet filters
Q:
In a source routing attack, the attacker modifies the _____ and routing information to make a packet appear to come from a different source, such as one that is already trusted for communications on a network.a. destination address b. source address c. destination headerd. source data
Q:
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.a. 30 b. 50 c. 75d. 100
Q:
The _____ translates information from the kernel and device drivers so the application can use it.a. RPC b. API c. BIOSd. resource manager
Q:
Operating system and network security is the ability to do which of the following reliably to information?a. Store b. Modifyc. Protectd. Grant access toe. All of the above
Q:
Hardeninginvolves taking specific actions to block or prevent attacks by means of operating system and network security methods. _________________________
Q:
NDS is a directory service used by Windows 2003 Server to provide a central listing of resources.
Q:
When new operating system software is purchased, it should be tested rigorously for security and reliability.
Q:
A MAN typically goes up to a distance of about 50 miles.
Q:
A formal account policy may include decisions about the format of usernames and restrictions on how passwords are constructed.
Q:
List three conventions for account names based on the user's actual name.
Q:
The Windows XP Professional ____________________ account is used for remote desktop help.
Q:
The most efficient way to assign user rights is to assign them to ____________________ instead of to individual user accounts.
Q:
Is the option "User must change password at next logon" necessary for accounts used by the server administrator in WIndows 2003?
Q:
Which useradd command parameter designates the default shell associated with the account?a. -q b. -R c. -sd. -f
Q:
How are new accounts set up for servers that use Active Directory?
a. MMC Local Users and Groups Snap-in
b. Computer Management tool
c. MMC Active Directory Users and Computers
d. Active Directory Users and Computers option on the Administrative Tools menu
e. Both c and d
Q:
What type of accounts are created when Active Directory is not installed on Windows Server 2003?a. Domain b. Local c. Enterprised. OUs
Q:
Which preconfigured Windows Server 2003 administrative template is used for managing desktop settings that are common to all of Windows 95, 98, and NT?a. Common.adm b. Inetres.adm c. Inetcorp.admd. System.adm
Q:
Where are group policy settings stored?a. In the registry b. In a secure ini file c. In a group policy objectd. In a system policy object