Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
Responsibility assignment matrices and project organizational charts are examples of tools used in procurement management.
a. True
b. False
Q:
Earned value management is a tool primarily used in human resource management.
a. True
b. False
Q:
Stakeholder analyses, work requests, and project charters are tools used in integration management.
a. True
b. False
Q:
Project human resource management is concerned with making effective use of the people involved with a project.
a. True
b. False
Q:
The primary role of project stakeholder management is to ensure that the project will satisfy the stated needs for which it was undertaken.
a. True
b. False
Q:
Project procurement management primarily involves identifying stakeholder needs while managing their engagement throughout the life of the project.
a. True
b. False
Q:
The importance of stakeholders' needs and expectations is limited to the beginning of a project.
a. True
b. False
Q:
Opponents of a project do not belong to the category of stakeholders.
a. True
b. False
Q:
A project's stakeholders includes its customers, users, and suppliers.
a. True
b. False
Q:
The only responsibility of a project manager is to meet the specific scope, time, and cost goals of a project.
a. True
b. False
Q:
Managing the triple constraint primarily involves making trade-offs between resources and quality.
a. True
b. False
Q:
In order to be realistic, a project manager should always set discrete goals instead of a range of objectives.
a. True
b. False
Q:
Questions about how a team will track schedule performance is related to a project's scope.
a. True
b. False
Q:
One of the main reasons why project management is challenging is because of the factor of uncertainty.
a. True
b. False
Q:
A project manager's primary role is to provide the funding for a project.
a. True
b. False
Q:
Resources in a project should be used effectively because they are limited.
a. True
b. False
Q:
Projects should be developed in increments.
a. True
b. False
Q:
Every project should have a well-defined objective.
a. True
b. False
Q:
A difference between operations and projects is that operations end when their objectives have been reached, whereas projects do not.
a. True
b. False
Q:
Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries.
a. True
b. False
Q:
List eight server monitoring functions that can be viewed using the Netware MONITOR command.
Q:
What two useful tools does NetWare offers to view user connections?
Q:
In the Windows 2000 Computer Management tool, what three options under Shared Folders provide information about users currently logged on to the operating system?
Q:
What two purposes does a honeypot serve for an organization?
Q:
List eight different types of information that might be found in a log created by an auditor.
Q:
What five things do inspectors typically look for?
Q:
What five activities are typically encompassed by host-based IDS?
Q:
List four third-party active intrusion-detection tools.
Q:
List five third-party passive intrusion-detection tools.
Q:
Match the following terms to the appropriate definition.a. Active intrusion detection f. Inspectorb. Alert g. IDSc. Auditor h. Passive intrusion detectiond. Decoy i. Trape. Filter j. Trigger1/ Setting up ways to detect and record intrusion attempts, without taking action2/ A message sent to an administrator about a specific operating system event3/ Used to attract attackers4/ Used to detect and report possible network and computer system intrusions5/ Sends an alert to an administrator or takes an action to block an attack6/ Records specific situations that an administrator wants to be warned about7/ Tracks a wide range of data and events related to an operating system8/ Performs a specific function when a predefined situation occurs9/ A viewing capability that enables you to display only specific events10/ Examines captured data and determines if there has been an intrusion
Q:
In Red Hat Linux, log files are managed through a process called ____________________.
Q:
In Red Hat Linux, the ____________________ Log provides information about jobs that are scheduled to run or that have already run, such as information about the number of minutes until a specific job will run.
Q:
In Windows Server 2003, the ____________________ log records information about how software applications are performing.
Q:
In Windows Server 2003, the ____________________ log records information about logon accesses and file, folder, and system policy changes.
Q:
Typically, an IDS ____________________ is software that automatically records information to a log.
Q:
A(n) ____________________ is a command-line string issued remotely that is intended to weaken the security or to alter an operating system.
Q:
Network-based intrusion-detection software is used on a computer or network device and typically places the NIC on that device in ____________________ mode.
Q:
Host wrapper software, which may also be called a(n) ____________________, monitors network activity into or out of the computer, including protocols, packets, broadcasts, remote logon attempts, dial-in attempts, port scanning, and other activities.
Q:
At minimum, ____________________ intrusion detection alerts a server or network administrator about an attack or intrusion, so the administrator can take action.
Q:
A(n) ____________________ can be acquired by using performance monitoring to establish slow, average, and peak periods for a network, and keeping records on these periods.
Q:
Can Network Monitor filter frames and packets on the basis of SAP or ETYPE?
Q:
Can the version of Network Monitor that comes with Windows Server 2003 capture and read the contents of any frames transported on the network segment to which the host computer is connected?
Q:
In Windows 2000 Server, is it necessary to install Network Monitor and Network Monitor Driver separately?
Q:
Is the Process Viewer used by Linux Red Hat 9.x to display a listing of processes and the users who are running those processes?
Q:
Does the Netware Remote Manager allow you to send messages to a particular user or to all users?
Q:
In Window Server 2003, does the print$ share enable you to view the number of clients currently using the server as a print server?
Q:
Are the Server logs for Mac OS X automatically rotated?
Q:
Are the Mac OS X logs located in the /var/log directory?
Q:
Is the System Log in Mac OS X contained in the file messages.x?
Q:
Does the Netware 6.x Console log contain error information recorded for the NetWare server?
Q:
Which file is being edited in the figure above?a. netinfo log b. lpr.log c. syslog.confd. system.log
Q:
Which Netware 6.x log is displayed in the figure above?a. Access b. Audit c. Moduled. Console
Q:
If a network administrator wants to use host-based intrusion detection, which devices in the figure above would need to be configured?a. Only the workstations b. Only the servers c. All workstations and serversd. None of the workstations or servers
Q:
Which Network Monitor statistic shows total traffic in frames for broadcasts, unicasts, and multicasts?a. % Network Utilization b. Frames Per Second c. Broadcasts Per Secondd. Muticasts Per Second
Q:
Which Network Monitor pane provides statistics about traffic from other computers on the network, including the MAC (device) address of each computer's NIC and data about the number of frames sent from and received by each computer?a. Graph b. Total Statistics c. Session Statisticsd. Station Statistics
Q:
Which Linux Red Hat 9.x "who" command option shows the amount of time each user process has been idle?a. -a b. -b c. -id. -s
Q:
Which command provides information about who is logged on to Red Hat Linux 9.x?a. who b. who am i c. procd. login
Q:
What utility can be used to clean up the Mac OS X Server logs?a. MacJanitor b. MacCleanUp c. MacSweepd. MacRotate
Q:
In Mac OS X, which log contains information about printing activities?a. /var/log/lookupd.log b. /var/log/lpr.log c. /var/log/secure.logd. /var/log/system.log
Q:
Q:
Q:
What directory are the default logs kept in Red Hat Linux 9.x?a. /etc/log b. /var/log c. /bin/logd. /conf/log
Q:
By default in Red Hat Linux 9.x , how many rotation levels does each log file have?a. 2 b. 3 c. 4d. 5
Q:
In event log, a warning that a CD-ROM is not loaded would be indicated by what type of symbol?
a. A blue "i" displayed in a white comment bubble
b. A black "!" that appears on a yellow caution symbol
c. A white "x" that appears inside a red circle
d. A red "x" that appears inside a white circle
Q:
In the event log, a notice that a service has started would be indicated with what type of symbol?
a. A blue "i" displayed in a white comment bubble
b. A black "!" that appears on a yellow caution symbol
c. A white "x" that appears inside a red circle
d. A red "x" that appears inside a white circle
Q:
In the event log, what type of event is indicated with a white "x" that appears inside a red circle?a. Information b. Warning c. Standbyd. Error
Q:
Which event log records events that are associated with Active Directory?a. Active Directory b. Directory Service c. Systemd. None of the above
Q:
What are the three principle event logs in Windows 2000 Server and Windows Server 2003?
a. System, Security, Application
b. System, Security, Directory Service
c. System, Directory Service, DNS
d. Security, Directory Service, Application
Q:
What type of computer is placed on a network to attract attackers?a. Dummy b. Honeypot c. Faked. Both a and be. Both b and c
Q:
Which type of IDS automatically records information to a log?a. Network-based b. Host-based c. Auditord. Inspector
Q:
Which type of intrusion detection system looks for intrusion signatures on ports, through frame and packet headers, and through commands?a. Network-based b. Host-based c. Auditord. Inspector
Q:
Which type of IDS looks for excessive use of a computer's resources, such as the CPU or memory?a. Passive b. Network-based c. Inspectord. Auditor
Q:
Which type of intrusion detection focuses on monitoring network traffic associated with a specific network segment?a. Host-based b. System-based c. Network-basedd. LAN-based
Q:
Which of the following network activities may be monitored by a personal firewall?a. Remote logon attempts b. Port scanning c. Dial-in attemptsd. All of the abovee. None of the above
Q:
What type of intrusion detection monitors the system on which it is loaded?a. Host-based b. System-based c. Network-basedd. Local-based
Q:
Which active intrusion-detection tool is a distributed system that works on servers and clients and denies application requests that are not permitted, on the basis of a security policy applying to the servers and clients?a. Entercept b. AppShield c. SecureHostd. Storm Watch
Q:
Which active intrusion-detection tool monitors for intruders and can take action on the basis of preestablished security policies?a. Entercept b. Symantec Intruder Alert c. SecureHostd. Storm Watch
Q:
Which active intrusion-detection tool monitors HTML activity and blocks attacks?a. Entercept b. AppShield c. Snortd. StormWatch
Q:
Which passive intrusion-detection tool audits activities on multiple operating systems, filters them, and collects the information into one large database for analysis of intrusions?a. loginlog b. lsof c. PreCisd. RealSecure
Q:
Which passive intrusion-detection tool monitors network activity and includes a proprietary programming language to customize the way it captures and analyzes information?a. klaxon b. Real Secure c. Dragon Squired. Network Flight Recorder