Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
In Netware 6.x are groups created by using the ConsoleOne tool?
Q:
What is displayed in the figure above?a. Evaluating effective rights in NetWare 6.xb. NetWare trustee rights for a folderc. Netware access rightsd. NetWare directory attributes
Q:
The figure above displays attributes of a folder on a(n) ____ formatted disk in Windows Server 2003.a. FAT32b. FATc. NTFSd. NFS
Q:
What is displayed in the figure above?a. Attributes in Windows 2000 Serverb. Folder properties Security tab in Windows Server 2003c. NetWare directory attributesd. NetWare trustee rights for a folder
Q:
When using NFS in Red Hat Linux 9.x, which service establishes and manages the remote connections through designated UDP ports?a. portmap b. rpc.mountd c. rpc.nfsdd. rpc.mapd
Q:
In Windows 2000/XP/2003, which of the following share permissions allows a user to access the share, change share permissions, turn off sharing, configure printer properties, and delete the share?a. Print b. Manage Documents c. Manage Printersd. Manage Print Jobs
Q:
Which Mac OS X Get Info folder and file permission enables the user to copy the folder's contents to the Drop Box folder in the Public folder of that user's home directory?a. Read & Write b. Read only c. Write onlyd. No Access
Q:
Which Netware 6.x access right, when applied to a directory, enables the contents to be viewed, and when applied to a file, allows viewing the filename, whether or not the file scan right is given at the directory level?a. R b. M c. Fd. A
Q:
Which Netware 6.x directory attribute flags the directory to show it contains operating system files?a. H b. Sy c. Nd. Dc
Q:
Which Netware 6.x file attribute enables a file's contents to be modified?a. Ci b. X c. Rid. Rw
Q:
Which Netware 6.x file attribute enables a file to be read, but prevents the file's contents from being altered and prevents the file from being deleted?a. Ci b. Di c. Hd. Ro
Q:
Which Netware 6.x file attribute keeps a file from being deleted, but the file can be renamed or the contents can be changed?a. Di b. Ro c. Shd. T
Q:
Which Red Hat Linux system directory is a virtual file system allocated in memory only, and contain files that refer to various processes running on the system, as well as details about the operating system kernel?a. /etc b. /bin c. /procd. /sbin
Q:
Which Red Hat Linux system directory contains configuration files that the system uses when the computer starts, most of which are reserved for the system administrator, because they contain system-critical information?a. /bin b. /etcc. /proc d. /root
Q:
Which Red Hat Linux system directory contains executables, which are the programs needed to start the system and perform other essential system tasks?a. /boot b. /etc c. /bind. /proc
Q:
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) does the file's owner have to this file?a. Read, write, execute b. Read, execute c. Read, writed. Write, execute
Q:
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) do others have to this file?a. Read b. Read, execute c. Read, write, executed. Read, write
Q:
What octal value do the read and write attributes have when combined?a. 4 b. 5 c. 6d. 7
Q:
What octal value do the read and execute attributes have when combined?a. 3 b. 5 c. 6d. 7
Q:
When using the octal chmod format, which of the following criteria is omitted?a. Owner b. Group c. Otherd. All
Q:
Which of the following parameters can be specified when using the octal format of the chmod command?
a. Who has the permissions
b. The actions to be taken on the permission
c. The permission
d. None of the above
Q:
What command is used to set up permissions in Linux/UNIX?a. chown b. perm c. chmodd. grep
Q:
In Red Hat Linux, permissions are granted on the basis of which of the following?a. Ownership b. Group membership c. Otherd. Alle. All of the above
Q:
In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents.a. r b. x c. dd. l
Q:
Which NTFS folder and file special permission can add or remove the Read-only and Hidden Folders and attributes?a. Write Attributesb. Write Extended Attributes c. Read Permissionsd. Change Permissions
Q:
Which NTFS folder and file special permission can add new folders and add new data at the end of files?a. Create Files/Write Data b. Create Folders/Append Data c. Write Attributesd. Delete Subfolders and Files
Q:
Which NTFS folder and file special permission can add or remove the Archive, Index, Compress, and Encrypt attributes?a. Read Extended Attributes b. Write Attributes c. Write Extended Attributesd. Read Permissions
Q:
Which NTFS folder and file permission only applies to folders?a. Modify b. List Folder Contents c. Writed. Read & Execute
Q:
Which NTFS folder and file permission includes the capabilities of both List Folder Contents and Read?a. Read b. Modify c. Executed. Read & Execute
Q:
Which NTFS folder and file permission can traverse files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents?a. Full Control b. List Folder Contents c. Modifyd. Read
Q:
If you want to compress files, which attribute cannot be set on the files?a. Index b. Read-only c. Hiddend. Encrypt
Q:
Which attributes do NTFS and FAT/FAT16 file systems have in common?a. Read-only, Archive, Hidden b. Hidden, Compress, Encrypt c. Archive, Index, Hiddend. Index, Archive, Read-only
Q:
Which attribute is checked to indicate that the folder or file needs to be backed up, because the folder or file is new or changed?a. Backup b. Change c. Archived. Index
Q:
Which of the following file systems offers the ability to set standard and special permissions on folders and files for user accounts and for groups?a. FAT b. FAT16 c. NTFSd. All of the above
Q:
What rating is based on Department of Defense TCSEC, which the U.S. government's NCSC uses to evaluate systems?a. ASIC b. C2 c. POSIXd. S2
Q:
Which of the following are components of an access control list?a. DACL b. SACLc. FACLd. Both a and b e. Both b and c
Q:
In Red Hat Linux 9.x, group security information is in the /etc/gshadow file. _________________________
Q:
Security groupsare used for e-mail or telephone lists, to provide quick, mass distribution of information, and they cannot be used to assign any permissions. _________________________
Q:
In queue-based printing, the network administrator performs several functions to set up a shared printer. The first is to install the printer and its driver in NetWare. The next step is to create a print queue for the printer. _________________________
Q:
NetWare recognizes a type of network drive, called a mapped drive, which is given drive letters such as S1 for the first drive, S2 for the second drive, and so on. _________________________
Q:
In BSD SVR4, the spooling system consists of the lp print program and the lpsched daemon. _________________________
Q:
The rpc.mountd service enables the Linux kernel to manage specific requests from a client. _________________________
Q:
Users typically access folder resources on UNIX/Linux systems by using Telnet or FTP. _________________________
Q:
To hide a share in Windows XP/2003, place the # sign just after its name. _________________________
Q:
In Windows XP/2003, the default permission on a shared folder is to give the Everyone group read permission to the folder. _________________________
Q:
If you do not want subdirectories under a specific directory to inherit its rights, you can create an access control list in NetWare 6.x. _________________________
Q:
Windows 2000/XP/2003, Red Hat Linux 9.x, NetWare 6.x, and Mac OS X all offer ways to access or share resources, such as directories, folders, files, and printers, over a network.
Q:
In Netware 6.x, the user account that creates a directory or file is the default owner, but this does not give that account the rights to configure attributes and trustee rights.
Q:
In Linux and UNIX, ownership of a folder or file can be changed by using the chown command from the root account.
Q:
UNIX and Linux files are assigned any combination of three permissions: read, write, and modify.
Q:
As a guideline for setting permissions, users should be given full control of their own home folders.
Q:
In Windows 2000/XP/2003, files can be compressed as well as encrypted at the same time.
Q:
In addition to the folder and file attributes on a FAT-formatted disk, files and folders on an NTFS-formatted disk have the Index, Compress, and Encrypt attributes.
Q:
When configuring file and folder attributes, if you check Read-only for a folder, the folder and the files in the folder are read-only.
Q:
Disk quotas reduce the risk that a user will occupy all available disk space, including an attacker who wants to bring down a system.
Q:
There are two general ways in which a system may be evaluated: Orange Book and Blue Book.
Q:
The advantage of having accounts based on the position or function is that, for the sake of security, it is easier to know who is logged on to a server.
Q:
A formal account policy may include decisions about the format of usernames and restrictions on how passwords are constructed.
Q:
What three security properties can be configured in the Red Hat User Manager?
Q:
What three account lockout options are available in Windows 2000 Server and Windows Server 2003?
Q:
What are the six specific password security options that can be in Windows 2000 Server and Windows Server 2003?
Q:
List seven of the strong password guidelines.
Q:
What two important tools are included with Mac OS X Server that enable server management?
Q:
What are the four ways the Mac OS X can be customized for different logon options?
Q:
What password restriction information is contained in the shadow file?
Q:
In UNIX/Linux systems, what seven pieces of information does the password file contain?
Q:
List three conventions for account names based on the user's actual name.
Q:
Match the following terms to the appropriate definition.a. COM f. Role-based securityb. GID g. Sitec. GPO h. System policyd. Inherited rights i. User rightse. Logon script j. User template1/ Enables some control of specific client configuration settings in Windows NT2/ Contains group policy settings for a site, domain, OU, or local computer3/ Used to enable efficient Active Directory operations on a network4/ Used to distinguish a group from all other groups on the same system5/ Global or over-riding rights to access a server in Windows 2000 Server6/ Netware 6.x global security access configured on the basis of function7/ Windows Server 2003 user rights that are assigned to a group and that automatically apply to all members of that group8/ Account settings, such as password restrictions, that are associated with specific accounts in NetWare 6.x9/ A set of standards for building software from individual objects10/ Commands that automatically run each time the user logs on to the domain
Q:
In UNIX/Linux, when two or more groups use the same ______________________________, there is a serious security risk.
Q:
The Windows XP Professional ____________________ account is used for remote desktop help.
Q:
Windows 2000/XP Professional is designed to support a maximum of 2 simultaneous _________________________ users using a dial-up connection.
Q:
____________________ accounts not only provides orderly access to server and network resources, it also enables server administrators to maintain security by monitoring which users are accessing the server and what resources they are using.
Q:
When you have a specialized security need, consider the ____________________ group policies as one of the first places to look to fulfill that need.
Q:
The ____________________ functional area is used to manage security functions used by members of a domain (e.g., using digital encryption options).
Q:
The ____________________ template is used to manage how Windows updates are performed through the Internet.
Q:
Windows 2000 group policy has evolved from the Windows NT Server 4.0 concept of ____________________.
Q:
The most efficient way to assign user rights is to assign them to ____________________ instead of to individual user accounts.
Q:
In Windows Server 2003, ____________________ generally relate to managing server or Active Directory functions.
Q:
Are security and other properties that are associated with specific accounts in NetWare configured through user templates before accounts are created?
Q:
Does Windows 2000 Server allow the administrator to set the account lockout option, so that an account is inaccessible for a specified time after a specified number of unsuccessful attempts to log on?