Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A folder D:\Files\Marketing has the following NTFS permissions:

• Administrators: Full Control

• Marketing: Change and Authenticated

• Users: Read

It has been shared on the server as "MARKETING", with the following share permissions:

• Full Control share permissions for the Marketing group

Which of the following effective permissions apply if a user from the Sales group accesses the \\FILESERVER\MARKETING shared folder?

A.

No access

B.

Full Control

C.

Read

D.

Change

If you do NOT have an original file to compare to, what is a good way to identify steganography in potential carrier files?

A.

Determine normal properties through methods like statistics and look for changes

B.

Determine normal network traffic patterns and look for changes

C.

Find files with the extension .stg

D.

Visually verify the files you suspect to be steganography messages

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).

You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

A.

Copy the files to a network share on an NTFS volume.

B.

Copy the files to a network share on a FAT32 volume.

C.

Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

D.

Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

Which of the following is a standard Unix command that would most likely be used to copy raw file system data for later forensic analysis?

A.

dd

B.

backup

C.

cp

D.

gzip

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

A.

Blowfish

B.

DES

C.

SHA-l

D.

Cast

What is the following sequence of packets demonstrating?

A.

telnet.com.telnet > client.com.38060: F 4289:4289(0) ack 92 win 1024

B.

client.com.38060 > telnet.com.telnet: .ack 4290 win 8760 (DF)

C.

client.com.38060 > telnet.com.telnet: F 92:92(0) ack 4290 win 8760 (DF)

D.

telnet.com.telnet > client.com.38060: .ack 93 win 1024

Which of the following correctly describes a stateless packet filter?

A.

Streams are rebuilt for analysis

B.

Data is passed through unchecked

C.

Packet processing is very slow

D.

Security is verified at the application level

What is the process of simultaneously installing an operating system and a Service Pack called?

A.

Synchronous Update

B.

Slipstreaming

C.

Simultaneous Update

D.

Synchronizing

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Copyright

B.

Trademark

C.

Trade secret

D.

Patent

When designing wireless networks, one strategy to consider is implementing security mechanisms at all layers of the OSI model. Which of the following protection mechanisms would protect layer 1?

A.

Hardening applications

B.

Limit RF coverage

C.

Employing firewalls

D.

Enabling strong encryption