Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
Which field in an IP packet contains the network address and the address of the receiving device?a. Source address b. Identification c. Versiond. Destination address
Q:
IPv6 has a(n) _____ address capability and a 40-byte header.a. 32 bit b. 64 bit c. 128 bitd. 256 bit
Q:
What is the length of the MAC address on a host system?a. 32 bits b. 48 bits c. 64 bitsd. 128 bits
Q:
Which of the following is performed by UDP to provide communication reliability?a. Flow control b. Sequencingc. Checksumd. Both a and b e. Both a and c
Q:
Which of the following applications use UDP for network communications?a. DNS b. NetBIOS naming functions c. Streaming audio applicationsd. All of the above
Q:
Which of the following can port-scanning software be used for?
a. To collect information about a target computer
b. To crash a system
c. To intercept and decrypt data sent from a target computer
d. Both a and b
e. Both b and c
Q:
Which of the following TCP/UDP ports is used for NetBIOS applications?a. 23 b. 53 c. 119d. 139
Q:
Which of the following TCP/UDP ports is used for DNS server applications?a. 53 b. 80 c. 139d. 443
Q:
Which TCP field is used when there is too little or no optional data to complete the required header length, which must be divisible by 32?a. Checksum b. Options c. Paddingd. Window
Q:
What is the length of the sequence number that TCP uses to ensure that all frames are received?a. 16 bits b. 32 bits c. 32 bytesd. 64 bytes
Q:
Which port does SMTP use for communication?a. 23 b. 25 c. 110d. 443
Q:
Which TCP ports are considered to be "well-known" ports?a. 0-511 b. 0-1023 c. 1-512d. 1-1024
Q:
What is the minimum length of a TCP header?a. 8 bytes b. 16 bytes c. 20 bytesd. 32 bytes
Q:
In the OSI model, what layer is the network layer?a. 1 b. 2 c. 3d. 4
Q:
Which of the following protocols both sequences and acknowledges frames?a. IP b. UDP c. TCPd. ICMP
Q:
IPTables is a powerful tool that can be used to implement network security in many ways; it is configured through a terminal window using the iptables command. _________________________
Q:
The simplest way to configure a firewall in Red Hat Linux 9.x is by using the Security Level Configuration tool. _________________________
Q:
In Windows Server 2003, Radius is a set of services that enable or manage remote access to Windows Server 2003, for instance, through dial-up or telecommunications lines. ______________________________
Q:
Routers can isolate portions of a network to prevent areas of heavy traffic from reaching the broader network system. _________________________
Q:
A route map is used to determine the best route through a network. _________________________
Q:
Some proxies are able to provide caching services as a way to reduce the load on servers within the internal network. _________________________
Q:
Network redundancy translation is used when there is a limited number of decoy addresses available, or when there are more computers on the internal network than decoy addresses. _________________________
Q:
Stateless filtering does not filter on the basis of the context of the communication, and so it has limited value in a firewall. _________________________
Q:
The border routeris a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction. _________________________
Q:
With CIDR, the number after the slash is the number of bits in the address that are allocated for the host identifier. _________________________
Q:
Routers that use a single protocol (such as TCP/IP) maintain multiple address databases.
Q:
A routerperforms packet filtering and is often used as a firewall on a network, in addition to the other functions it performs.
Q:
Packet filtering is accomplished using one of two techniques: stateless filtering and stateful filtering.
Q:
One element in border security is to configure security policies on each firewall so that access is automatically allowed, except for those who are manually configured to have access blocked through the firewall.
Q:
Class D addresses do not reflect the network size, but only tell you that the communication is a multicast.
Q:
There are six IP address classes, Class A through Class F, each used with a different type of network.
Q:
The payload data within the IP packet is actually the TCP header and the application data when connection-oriented services are used.
Q:
IP is a connection-oriented protocol because its primary mission is to provide network-to-network addressing and routing information, and to change the size of packets when the size varies from network to network.
Q:
UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the checksum to ensure reliability.
Q:
TCP/IP consists of nearly 200 nonproprietary protocols that interconnect computer systems efficiently and reliably.
Q:
In NetWare 6.x, how is access to files and directories controlled?
Q:
List seven system directories in Red Hat Linux.
Q:
What six folder and file permissions are supported by NTFS?
Q:
What four categories of information are typically contained in each ACL?
Q:
What are three guidelines that will help to simplify your planning for using groups?
Q:
What four types of groups are available in Windows 2000/XP/2003? (List and describe their associated scope.)
Q:
To use NFS in Red Hat Linux 9.x, which three services must be enabled?
Q:
When setting up printing in Windows 2000/XP/2003, which four share permissions are checked for allow or deny?
Q:
What are the three Windows 2000/XP/2003 share permissions for folders?
Q:
Folders can be marked as ____________________ to prevent users from viewing their contents.
Q:
____________________permissionsare used when the default standard permission settings do not provide enough customization for the current security need.
Q:
A(n) ____________________ security rating is not a guarantee that an attack on a system will be unsuccessful, but it indicates strong security capabilities.
Q:
As an administrator, you can easily verify how groups are set up by periodically reviewing the contents of the ____________________ file.
Q:
In Windows Server 2003 a(n) ____________________ group is used when there is a single domain, or is used to manage resources in a particular domain so that global and universal groups can access those resources.
Q:
___________________________________ is a print service designed to work with printers that have NetWare's printer agent software built in.
Q:
To map the PUBLIC directory as search drive S1 in Netware 6.x, you would type ____________________.
Q:
In Red Hat Linux 9.x, you can set up a printer and start lpd by using the Red Hat ____________________ tool.
Q:
To ensure proper security, use ____________________ authentication on Linux/UNIX systems.
Q:
When you create a shared folder in Windows 2000 and in earlier Windows versions, the default permission is to give ____________________ to the Everyone group.
Q:
Can shared folders be offered from either a FAT16/FAT32-formatted drive or an NTFS drive?
Q:
Is the Netware 6.x FLAGcommand useful if you want to see a listing of how the attributes are set on all directories?
Q:
Does the Red Hat Linux /lib directory contain configuration files that the system uses when the computer starts?
Q:
Does the Linux Write permission allow a user or a group of users to run a program?
Q:
When setting NTFS file and folder permissions, does the Deny option override all other access?
Q:
In Windows 2000, are files and folders automatically flagged to archive when they are changed?
Q:
In Windows Server 2003, does FAT32 enable disk quotas to be set on users and groups?
Q:
Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network?
Q:
Does Mac OS X Server enable you to create groups, called workgroups, through the Server Manager utility?
Q:
In Netware 6.x are groups created by using the ConsoleOne tool?
Q:
What is displayed in the figure above?a. Evaluating effective rights in NetWare 6.xb. NetWare trustee rights for a folderc. Netware access rightsd. NetWare directory attributes
Q:
The figure above displays attributes of a folder on a(n) ____ formatted disk in Windows Server 2003.a. FAT32b. FATc. NTFSd. NFS
Q:
What is displayed in the figure above?a. Attributes in Windows 2000 Serverb. Folder properties Security tab in Windows Server 2003c. NetWare directory attributesd. NetWare trustee rights for a folder
Q:
When using NFS in Red Hat Linux 9.x, which service establishes and manages the remote connections through designated UDP ports?a. portmap b. rpc.mountd c. rpc.nfsdd. rpc.mapd
Q:
In Windows 2000/XP/2003, which of the following share permissions allows a user to access the share, change share permissions, turn off sharing, configure printer properties, and delete the share?a. Print b. Manage Documents c. Manage Printersd. Manage Print Jobs
Q:
Which Mac OS X Get Info folder and file permission enables the user to copy the folder's contents to the Drop Box folder in the Public folder of that user's home directory?a. Read & Write b. Read only c. Write onlyd. No Access
Q:
Which Netware 6.x access right, when applied to a directory, enables the contents to be viewed, and when applied to a file, allows viewing the filename, whether or not the file scan right is given at the directory level?a. R b. M c. Fd. A
Q:
Which Netware 6.x directory attribute flags the directory to show it contains operating system files?a. H b. Sy c. Nd. Dc
Q:
Which Netware 6.x file attribute enables a file's contents to be modified?a. Ci b. X c. Rid. Rw
Q:
Which Netware 6.x file attribute enables a file to be read, but prevents the file's contents from being altered and prevents the file from being deleted?a. Ci b. Di c. Hd. Ro
Q:
Which Netware 6.x file attribute keeps a file from being deleted, but the file can be renamed or the contents can be changed?a. Di b. Ro c. Shd. T
Q:
Which Red Hat Linux system directory is a virtual file system allocated in memory only, and contain files that refer to various processes running on the system, as well as details about the operating system kernel?a. /etc b. /bin c. /procd. /sbin
Q:
Which Red Hat Linux system directory contains configuration files that the system uses when the computer starts, most of which are reserved for the system administrator, because they contain system-critical information?a. /bin b. /etcc. /proc d. /root
Q:
Which Red Hat Linux system directory contains executables, which are the programs needed to start the system and perform other essential system tasks?a. /boot b. /etc c. /bind. /proc
Q:
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) does the file's owner have to this file?a. Read, write, execute b. Read, execute c. Read, writed. Write, execute
Q:
When viewing permissions on a file that have been set to rwxr-xr-x, what permission(s) do others have to this file?a. Read b. Read, execute c. Read, write, executed. Read, write