Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
IPTables is used to configure firewall and NAT activities in which of the following operating systems?a. Windows 2000 Server b. Windows Server 2003 c. Mac OS Xd. Red Hat Linux
Q:
When using the Red Hat Linux 9.x Security Level Configuration tool, which security level only allows connections for using DNS and DHCP services?a. High b. Medium c. Lowd. No Firewall
Q:
Q:
What is the only metric used by the RIP routing protocol?
a. Bandwidth
b. Size of the packet
c. Number of incoming packets waiting to be processed
d. Number of hops
Q:
Which of the following can be used to calculate a metric?a. Number of hops b. Size of the packet c. Bandwidthd. Both a and be. a, b, and c
Q:
Which type of proxy stores recently made service requests, allowing them to fulfill an individual client's request without needing to contact the server on the internal network?a. Application-level gateway b. Circuit-level gateway c. Cachingd. Firewall
Q:
Which type of NAT is used when the firewall is connected to multiple public networks or Internet service providers, and thus there is a range of different decoy addresses used for each external network?a. Network redundancy translation b. Dynamic translation c. Static translationd. Load balancing
Q:
Which type of packet filtering tracks information about a communication session, such as which ports are in use, drawing from the contents of multiple packets?a. Ingress b. Stateful c. Statelessd. Source route
Q:
You have configured a firewall to block Telnet and SSH communications by blocking the TCP and UDP ports 22 and 80. Will this accomplish the job?
a. Yes
b. No, because it is also necessary to block port 443 for FTP
c. No, because SSH is still not blocked
d. No, because Telnet is still not blocked
Q:
What protocol was used extensively for versions of NetWare prior to version 5?a. UDP b. IPX c. TCP/IPd. NetBEUI
Q:
If you required 1000 IP host identities for your network, which of the following CIDR addresses would be valid if you want to make the best use of IP addressing?a. 161.15.37.16/12 b. 161.15.37.16/20 c. 161.15.37.16/22d. 161.15.37.16/25
Q:
Which of the following is the loopback address?a. 127.0.0.0 b. 172.0.0.1 c. 172.0.0.0d. 127.0.0.1
Q:
What is the default subnet mask for a Class D network?a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0d. 255.255.255.224e. None of the above
Q:
Which of the following is the proper range for a Class D network?a. 1.0.0.0 - 126.255.255.255 b. 128.0.0.0 - 191.255.255.255 c. 192.0.0.0 - 223.255.255.255d. 224.0.0.0 to 239.255.255.255
Q:
How many station addresses are available in a Class B network?a. 254 b. 65,232 c. 65,534d. 63,535
Q:
When using Class B addressing, which portion of the IP address 140.26.23.48 is the network address?a. 140 b. 140.26 c. 140.26.23d. 26.23
Q:
When using classful addressing, the IP address 122.16.232.4 belongs to which network class?a. A b. B c. Cd. D
Q:
Which field in an IP packet contains the network address and the address of the receiving device?a. Source address b. Identification c. Versiond. Destination address
Q:
IPv6 has a(n) _____ address capability and a 40-byte header.a. 32 bit b. 64 bit c. 128 bitd. 256 bit
Q:
What is the length of the MAC address on a host system?a. 32 bits b. 48 bits c. 64 bitsd. 128 bits
Q:
Which of the following is performed by UDP to provide communication reliability?a. Flow control b. Sequencingc. Checksumd. Both a and b e. Both a and c
Q:
Which of the following applications use UDP for network communications?a. DNS b. NetBIOS naming functions c. Streaming audio applicationsd. All of the above
Q:
Which of the following can port-scanning software be used for?
a. To collect information about a target computer
b. To crash a system
c. To intercept and decrypt data sent from a target computer
d. Both a and b
e. Both b and c
Q:
Which of the following TCP/UDP ports is used for NetBIOS applications?a. 23 b. 53 c. 119d. 139
Q:
Which of the following TCP/UDP ports is used for DNS server applications?a. 53 b. 80 c. 139d. 443
Q:
Which TCP field is used when there is too little or no optional data to complete the required header length, which must be divisible by 32?a. Checksum b. Options c. Paddingd. Window
Q:
What is the length of the sequence number that TCP uses to ensure that all frames are received?a. 16 bits b. 32 bits c. 32 bytesd. 64 bytes
Q:
Which port does SMTP use for communication?a. 23 b. 25 c. 110d. 443
Q:
Which TCP ports are considered to be "well-known" ports?a. 0-511 b. 0-1023 c. 1-512d. 1-1024
Q:
What is the minimum length of a TCP header?a. 8 bytes b. 16 bytes c. 20 bytesd. 32 bytes
Q:
In the OSI model, what layer is the network layer?a. 1 b. 2 c. 3d. 4
Q:
Which of the following protocols both sequences and acknowledges frames?a. IP b. UDP c. TCPd. ICMP
Q:
IPTables is a powerful tool that can be used to implement network security in many ways; it is configured through a terminal window using the iptables command. _________________________
Q:
The simplest way to configure a firewall in Red Hat Linux 9.x is by using the Security Level Configuration tool. _________________________
Q:
In Windows Server 2003, Radius is a set of services that enable or manage remote access to Windows Server 2003, for instance, through dial-up or telecommunications lines. ______________________________
Q:
Routers can isolate portions of a network to prevent areas of heavy traffic from reaching the broader network system. _________________________
Q:
A route map is used to determine the best route through a network. _________________________
Q:
Some proxies are able to provide caching services as a way to reduce the load on servers within the internal network. _________________________
Q:
Network redundancy translation is used when there is a limited number of decoy addresses available, or when there are more computers on the internal network than decoy addresses. _________________________
Q:
Stateless filtering does not filter on the basis of the context of the communication, and so it has limited value in a firewall. _________________________
Q:
The border routeris a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction. _________________________
Q:
With CIDR, the number after the slash is the number of bits in the address that are allocated for the host identifier. _________________________
Q:
Routers that use a single protocol (such as TCP/IP) maintain multiple address databases.
Q:
A routerperforms packet filtering and is often used as a firewall on a network, in addition to the other functions it performs.
Q:
Packet filtering is accomplished using one of two techniques: stateless filtering and stateful filtering.
Q:
One element in border security is to configure security policies on each firewall so that access is automatically allowed, except for those who are manually configured to have access blocked through the firewall.
Q:
Class D addresses do not reflect the network size, but only tell you that the communication is a multicast.
Q:
There are six IP address classes, Class A through Class F, each used with a different type of network.
Q:
The payload data within the IP packet is actually the TCP header and the application data when connection-oriented services are used.
Q:
IP is a connection-oriented protocol because its primary mission is to provide network-to-network addressing and routing information, and to change the size of packets when the size varies from network to network.
Q:
UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the checksum to ensure reliability.
Q:
TCP/IP consists of nearly 200 nonproprietary protocols that interconnect computer systems efficiently and reliably.
Q:
In NetWare 6.x, how is access to files and directories controlled?
Q:
List seven system directories in Red Hat Linux.
Q:
What six folder and file permissions are supported by NTFS?
Q:
What four categories of information are typically contained in each ACL?
Q:
What are three guidelines that will help to simplify your planning for using groups?
Q:
What four types of groups are available in Windows 2000/XP/2003? (List and describe their associated scope.)
Q:
To use NFS in Red Hat Linux 9.x, which three services must be enabled?
Q:
When setting up printing in Windows 2000/XP/2003, which four share permissions are checked for allow or deny?
Q:
What are the three Windows 2000/XP/2003 share permissions for folders?
Q:
Folders can be marked as ____________________ to prevent users from viewing their contents.
Q:
____________________permissionsare used when the default standard permission settings do not provide enough customization for the current security need.
Q:
A(n) ____________________ security rating is not a guarantee that an attack on a system will be unsuccessful, but it indicates strong security capabilities.
Q:
As an administrator, you can easily verify how groups are set up by periodically reviewing the contents of the ____________________ file.
Q:
In Windows Server 2003 a(n) ____________________ group is used when there is a single domain, or is used to manage resources in a particular domain so that global and universal groups can access those resources.
Q:
___________________________________ is a print service designed to work with printers that have NetWare's printer agent software built in.
Q:
To map the PUBLIC directory as search drive S1 in Netware 6.x, you would type ____________________.
Q:
In Red Hat Linux 9.x, you can set up a printer and start lpd by using the Red Hat ____________________ tool.
Q:
To ensure proper security, use ____________________ authentication on Linux/UNIX systems.
Q:
When you create a shared folder in Windows 2000 and in earlier Windows versions, the default permission is to give ____________________ to the Everyone group.
Q:
Can shared folders be offered from either a FAT16/FAT32-formatted drive or an NTFS drive?
Q:
Is the Netware 6.x FLAGcommand useful if you want to see a listing of how the attributes are set on all directories?
Q:
Does the Red Hat Linux /lib directory contain configuration files that the system uses when the computer starts?
Q:
Does the Linux Write permission allow a user or a group of users to run a program?
Q:
When setting NTFS file and folder permissions, does the Deny option override all other access?
Q:
In Windows 2000, are files and folders automatically flagged to archive when they are changed?
Q:
In Windows Server 2003, does FAT32 enable disk quotas to be set on users and groups?
Q:
Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network?
Q:
Does Mac OS X Server enable you to create groups, called workgroups, through the Server Manager utility?