Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
What octal value do the read and write attributes have when combined?a. 4 b. 5 c. 6d. 7
Q:
What octal value do the read and execute attributes have when combined?a. 3 b. 5 c. 6d. 7
Q:
When using the octal chmod format, which of the following criteria is omitted?a. Owner b. Group c. Otherd. All
Q:
Which of the following parameters can be specified when using the octal format of the chmod command?
a. Who has the permissions
b. The actions to be taken on the permission
c. The permission
d. None of the above
Q:
What command is used to set up permissions in Linux/UNIX?a. chown b. perm c. chmodd. grep
Q:
In Red Hat Linux, permissions are granted on the basis of which of the following?a. Ownership b. Group membership c. Otherd. Alle. All of the above
Q:
In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents.a. r b. x c. dd. l
Q:
Which NTFS folder and file special permission can add or remove the Read-only and Hidden Folders and attributes?a. Write Attributesb. Write Extended Attributes c. Read Permissionsd. Change Permissions
Q:
Which NTFS folder and file special permission can add new folders and add new data at the end of files?a. Create Files/Write Data b. Create Folders/Append Data c. Write Attributesd. Delete Subfolders and Files
Q:
Which NTFS folder and file special permission can add or remove the Archive, Index, Compress, and Encrypt attributes?a. Read Extended Attributes b. Write Attributes c. Write Extended Attributesd. Read Permissions
Q:
Which NTFS folder and file permission only applies to folders?a. Modify b. List Folder Contents c. Writed. Read & Execute
Q:
Which NTFS folder and file permission includes the capabilities of both List Folder Contents and Read?a. Read b. Modify c. Executed. Read & Execute
Q:
Which NTFS folder and file permission can traverse files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents?a. Full Control b. List Folder Contents c. Modifyd. Read
Q:
If you want to compress files, which attribute cannot be set on the files?a. Index b. Read-only c. Hiddend. Encrypt
Q:
Which attributes do NTFS and FAT/FAT16 file systems have in common?a. Read-only, Archive, Hidden b. Hidden, Compress, Encrypt c. Archive, Index, Hiddend. Index, Archive, Read-only
Q:
Which attribute is checked to indicate that the folder or file needs to be backed up, because the folder or file is new or changed?a. Backup b. Change c. Archived. Index
Q:
Which of the following file systems offers the ability to set standard and special permissions on folders and files for user accounts and for groups?a. FAT b. FAT16 c. NTFSd. All of the above
Q:
What rating is based on Department of Defense TCSEC, which the U.S. government's NCSC uses to evaluate systems?a. ASIC b. C2 c. POSIXd. S2
Q:
Which of the following are components of an access control list?a. DACL b. SACLc. FACLd. Both a and b e. Both b and c
Q:
In Red Hat Linux 9.x, group security information is in the /etc/gshadow file. _________________________
Q:
Security groupsare used for e-mail or telephone lists, to provide quick, mass distribution of information, and they cannot be used to assign any permissions. _________________________
Q:
In queue-based printing, the network administrator performs several functions to set up a shared printer. The first is to install the printer and its driver in NetWare. The next step is to create a print queue for the printer. _________________________
Q:
NetWare recognizes a type of network drive, called a mapped drive, which is given drive letters such as S1 for the first drive, S2 for the second drive, and so on. _________________________
Q:
In BSD SVR4, the spooling system consists of the lp print program and the lpsched daemon. _________________________
Q:
The rpc.mountd service enables the Linux kernel to manage specific requests from a client. _________________________
Q:
Users typically access folder resources on UNIX/Linux systems by using Telnet or FTP. _________________________
Q:
To hide a share in Windows XP/2003, place the # sign just after its name. _________________________
Q:
In Windows XP/2003, the default permission on a shared folder is to give the Everyone group read permission to the folder. _________________________
Q:
If you do not want subdirectories under a specific directory to inherit its rights, you can create an access control list in NetWare 6.x. _________________________
Q:
Windows 2000/XP/2003, Red Hat Linux 9.x, NetWare 6.x, and Mac OS X all offer ways to access or share resources, such as directories, folders, files, and printers, over a network.
Q:
In Netware 6.x, the user account that creates a directory or file is the default owner, but this does not give that account the rights to configure attributes and trustee rights.
Q:
In Linux and UNIX, ownership of a folder or file can be changed by using the chown command from the root account.
Q:
UNIX and Linux files are assigned any combination of three permissions: read, write, and modify.
Q:
As a guideline for setting permissions, users should be given full control of their own home folders.
Q:
In Windows 2000/XP/2003, files can be compressed as well as encrypted at the same time.
Q:
In addition to the folder and file attributes on a FAT-formatted disk, files and folders on an NTFS-formatted disk have the Index, Compress, and Encrypt attributes.
Q:
When configuring file and folder attributes, if you check Read-only for a folder, the folder and the files in the folder are read-only.
Q:
Disk quotas reduce the risk that a user will occupy all available disk space, including an attacker who wants to bring down a system.
Q:
There are two general ways in which a system may be evaluated: Orange Book and Blue Book.
Q:
The advantage of having accounts based on the position or function is that, for the sake of security, it is easier to know who is logged on to a server.
Q:
A formal account policy may include decisions about the format of usernames and restrictions on how passwords are constructed.
Q:
What three security properties can be configured in the Red Hat User Manager?
Q:
What three account lockout options are available in Windows 2000 Server and Windows Server 2003?
Q:
What are the six specific password security options that can be in Windows 2000 Server and Windows Server 2003?
Q:
List seven of the strong password guidelines.
Q:
What two important tools are included with Mac OS X Server that enable server management?
Q:
What are the four ways the Mac OS X can be customized for different logon options?
Q:
What password restriction information is contained in the shadow file?
Q:
In UNIX/Linux systems, what seven pieces of information does the password file contain?
Q:
List three conventions for account names based on the user's actual name.
Q:
Match the following terms to the appropriate definition.a. COM f. Role-based securityb. GID g. Sitec. GPO h. System policyd. Inherited rights i. User rightse. Logon script j. User template1/ Enables some control of specific client configuration settings in Windows NT2/ Contains group policy settings for a site, domain, OU, or local computer3/ Used to enable efficient Active Directory operations on a network4/ Used to distinguish a group from all other groups on the same system5/ Global or over-riding rights to access a server in Windows 2000 Server6/ Netware 6.x global security access configured on the basis of function7/ Windows Server 2003 user rights that are assigned to a group and that automatically apply to all members of that group8/ Account settings, such as password restrictions, that are associated with specific accounts in NetWare 6.x9/ A set of standards for building software from individual objects10/ Commands that automatically run each time the user logs on to the domain
Q:
In UNIX/Linux, when two or more groups use the same ______________________________, there is a serious security risk.
Q:
The Windows XP Professional ____________________ account is used for remote desktop help.
Q:
Windows 2000/XP Professional is designed to support a maximum of 2 simultaneous _________________________ users using a dial-up connection.
Q:
____________________ accounts not only provides orderly access to server and network resources, it also enables server administrators to maintain security by monitoring which users are accessing the server and what resources they are using.
Q:
When you have a specialized security need, consider the ____________________ group policies as one of the first places to look to fulfill that need.
Q:
The ____________________ functional area is used to manage security functions used by members of a domain (e.g., using digital encryption options).
Q:
The ____________________ template is used to manage how Windows updates are performed through the Internet.
Q:
Windows 2000 group policy has evolved from the Windows NT Server 4.0 concept of ____________________.
Q:
The most efficient way to assign user rights is to assign them to ____________________ instead of to individual user accounts.
Q:
In Windows Server 2003, ____________________ generally relate to managing server or Active Directory functions.
Q:
Are security and other properties that are associated with specific accounts in NetWare configured through user templates before accounts are created?
Q:
Does Windows 2000 Server allow the administrator to set the account lockout option, so that an account is inaccessible for a specified time after a specified number of unsuccessful attempts to log on?
Q:
Do common slang terms make strong passwords?
Q:
Is the Mac OS X Server Admin tool a tool for managing users, groups, and computers that access the server?
Q:
Can ConsoleOne be run from a workstation under the Remote Console NLM?
Q:
In Red Hat Linux, is an account enabled by default even if there is no password specified when the account is created?
Q:
In Red Hat Linux, is every account a member of a least one group?
Q:
In Red Hat Linux, are the group names that a user belongs to included in the /etc/passwd file?
Q:
If the payroll supervisor of a company decides to leave the company, should the administrator disable his or her account?
Q:
Is the option "User must change password at next logon" necessary for accounts used by the server administrator in WIndows 2003?
Q:
Which operating system uses the dialog in the figure above to configure password settings?a. Windows Server 2003 b. Red Hat Linux c. Mac OS Xd. Netware 6.x
Q:
Which operating system uses the dialog in the figure above to create accounts?a. Windows Server 2003 b. Red Hat Linx c. Mac OS Xd. Netware 6.x
Q:
Which operating system uses the dialog in the figure above to create accounts?a. Windows Server 2003 b. Red Hat Linux c. Mac OS Xd. Netware 6.x
Q:
Which useradd command parameter designates the default shell associated with the account?a. -q b. -R c. -sd. -f
Q:
Which useradd command parameter specifies an account expiration date?a. -p b. -G c. -Md. -e
Q:
Which useradd command parameter gives an account description?a. -c b. -d c. -ed. -f
Q:
What is the largest number that a Linux UID can be?a. 20,000 b. 40,000 c. 60,000d. 100,000
Q:
Which account properties Dial-in tab option enables the server to verify that a call is from a known location?a. Allow access b. Callback security c. Static routingd. None of the above
Q:
Which of the following options is available in the account properties Address tab?a. Street address b. Postal code c. Stated. Post Office Boxe. All of the above