Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator for Perfect Solutions Inc. You have to install Windows 2000 on a computer that will work as a file server. You have to format the hard disk of the computer, using a file system that supports encryption. Which of the following file systems will you use to accomplish this?

A.

NTFS

B.

FAT32

C.

HPFS

D.

FAT16

Which of the following types of attacks cannot be prevented by technical measures only?

A.

Ping flood attack

B.

Brute force

C.

Smurf DoS

D.

Social engineering

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

A.

Jplag

B.

Turnitin

C.

VAST

D.

SCAM

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

A.

kern.* @192.168.0.1

B.

!*.* @192.168.0.1

C.

*.* @192.168.0.1

D.

!kern.* @192.168.0.1

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are creating a user account by using the USERADD command. Which of the following entries cannot be used for specifying a user ID?

Each correct answer represents a complete solution. Choose all that apply.

A.

0

B.

99

C.

100

D.

-1