Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is an advantage of private circuits versus VPNs?

A.

Flexibility

B.

Performance guarantees

C.

Cost

D.

Time required to implement

Which port category does the port 110 fall into?

A.

Well known port

B.

Dynamic port

C.

Private port

D.

Application port

Which of the following logging tasks should be evaluated in real-time?

A.

Inside and perimeter log trends review

B.

Routine account creation/removal

C.

Log management system performance

D.

Loss of service on critical assets

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as.

A.

False negative

B.

False positive

C.

True positive

D.

True negative

Which of the following features of Windows 7 allows an administrator to both passively review installed software and configure policies to prevent out-of-date or insecure software from running?

A.

Direct Access

B.

Software Restriction Policies

C.

App Locker

D.

User Account Control

Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

A.

Both volumes should be converted to NTFS at install time.

B.

First volume should be FAT32 and second volume should be NTFS.

C.

First volume should be EFS and second volume should be FAT32.

D.

Both volumes should be converted to FAT32 with NTFS DACLs.

Which of the following fields CANNOT be hashed by Authentication Header (AH) in transport mode?

A.

Length

B.

Source IP

C.

TTL

D.

Destination IP

Which of the following is a valid password for a system with the default "Password must meet complexity requirements" setting enabled as part of the GPO Password policy requirements?

A.

The Cat Chased its Tail AII Night

B.

disk ACCESS failed

C.

SETI@HOME

D.

SaNS2006

Which of the following Linux commands can change both the username and group name a file belongs to?

A.

chown

B.

chgrp

C.

chmod

D.

newgrp

What advantage does a Client-to-Client VPN have over other types of VPNs?

A.

The traffic never traverses any network segment in clear text

B.

The client applications do not need to support cryptography

C.

Network devices do not have to look at the message content to provide QoS

D.

The VPN gateway is located at the edge of the corporate network