Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
A MAN typically goes up to a distance of about 50 miles.Answer
This answer is hidden. It contains 1 characters.
Related questions
Q:
List four mediums over which computer networks can transmit data.
Q:
List three common password options that are offered in the BIOS.
Q:
What six basic tasks does an operating system perform?
Q:
List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.
Q:
Match the following terms to the appropriate definitions.a. Attribute f. LSRRb. Buffer g. Macroc. Buffer overflow h. Source routingd. DoS attack i. Spoofinge. DDos attack j. Worm1/ Occurs when there is more data to store in a buffer than the buffer can hold2/ The address of the source computer is changed3/ A computer causes other computers to launch attacks directed at one or more targets4/ The sender of a packet specifies the precise path that a packet will take5/ A form of source routing that specifies only one portion of a route6/ A characteristic associated with a directory, folder, or file7/ Flooding a network with frames or packets containing errors8/ A program that replicates and replicates on the same computer9/ A storage area in a device that temporarily saves information in memory10/ A set of instructions for an activity that is performed frequently
Q:
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
Q:
Is a virus hoax a virus?
Q:
Does a locked computer operations room guarantee the protection of a network server?
Q:
Do the operating system device drivers coordinate operating system functions such as control of memory and storage?
Q:
What type of port might be used during a port-scanning attack?a. Serial b. Parallel c. UDPd. USB
Q:
Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.a. buffering b. denial of service c. wormsd. spoofing
Q:
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.a. Routers b. Proxy servers c. Network address translationd. Packet filters
Q:
In a source routing attack, the attacker modifies the _____ and routing information to make a packet appear to come from a different source, such as one that is already trusted for communications on a network.a. destination address b. source address c. destination headerd. source data
Q:
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.a. 30 b. 50 c. 75d. 100
Q:
The _____ translates information from the kernel and device drivers so the application can use it.a. RPC b. API c. BIOSd. resource manager
Q:
Operating system and network security is the ability to do which of the following reliably to information?a. Store b. Modifyc. Protectd. Grant access toe. All of the above
Q:
Hardeninginvolves taking specific actions to block or prevent attacks by means of operating system and network security methods. _________________________
Q:
NDS is a directory service used by Windows 2003 Server to provide a central listing of resources.
Q:
When new operating system software is purchased, it should be tested rigorously for security and reliability.
Q:
A formal account policy may include decisions about the format of usernames and restrictions on how passwords are constructed.
Q:
List three conventions for account names based on the user's actual name.
Q:
The Windows XP Professional ____________________ account is used for remote desktop help.
Q:
The most efficient way to assign user rights is to assign them to ____________________ instead of to individual user accounts.
Q:
Is the option "User must change password at next logon" necessary for accounts used by the server administrator in WIndows 2003?
Q:
Which useradd command parameter designates the default shell associated with the account?a. -q b. -R c. -sd. -f
Q:
How are new accounts set up for servers that use Active Directory?
a. MMC Local Users and Groups Snap-in
b. Computer Management tool
c. MMC Active Directory Users and Computers
d. Active Directory Users and Computers option on the Administrative Tools menu
e. Both c and d
Q:
What type of accounts are created when Active Directory is not installed on Windows Server 2003?a. Domain b. Local c. Enterprised. OUs
Q:
Which preconfigured Windows Server 2003 administrative template is used for managing desktop settings that are common to all of Windows 95, 98, and NT?a. Common.adm b. Inetres.adm c. Inetcorp.admd. System.adm
Q:
Where are group policy settings stored?a. In the registry b. In a secure ini file c. In a group policy objectd. In a system policy object
Q:
The first step in developing an account policy in a company is usually to establish conventions for account names. _________________________