A folder D:\Files\Marketing has the following NTFS permissions:
Administrators: Full Control
Marketing: Change and Authenticated
Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?
Answer : C
Which of the following SIP INVITE lines indicates to the remote registrar the VoIP phone that initiated the call?
Answer : D
What is the following sequence of packets demonstrating?
Answer : C
When an IIS filename extension is mapped, what does this mean?
Answer : B
The previous system administrator at your company used to rely heavily on email lists, such as vendor lists and Bug Traq to get information about updates and patches. While a useful means of acquiring data, this requires time and effort to read through. In an effort to speed things up, you decide to switch to completely automated updates and patching. You set up your systems to automatically patch your production servers using a cron job and a scripted apt-get upgrade command. Of the following reasons, which explains why you may want to avoid this plan?
Answer : D
Which of the following would be a valid reason to use a Windows workgroup?
Answer : D
You are an Intrusion Detection Analyst and the system has alerted you to an Event of
Interest (EOI) that appears to be activity generated by a worm. You investigate and find that the network traffic was normal. How would this type of alert be categorized?
Answer : A
Which of the following heights of fence deters only casual trespassers?
Answer : D
John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Answer : B,D
What would the following IP tables command do?
IP tables -I INPUT -s 99.23.45.1/32 -j DROP
Answer : A
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. For testing purposes, you have configured a default IP-table with several filtering rules. You want to reconfigure the table. For this, you decide to remove the rules from all the chains in the table. Which of the following commands will you use?
Answer : D
Which of the following are advantages of Network Intrusion Detection Systems (NIDS)?
Answer : C
When Net Stumbler is initially launched, it sends wireless frames to which of the following addresses?
Answer : A
Which of the following are examples of Issue-Specific policies all organizations should address?
Answer : D
You are reviewing a packet capture file from your network intrusion detection system. In the packet stream, you come across a long series of "no operation" (NOP) commands. In addition to the NOP commands, there appears to be a malicious payload. Of the following, which is the most appropriate preventative measure for this type of attack?
Answer : C