Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?

A.

Data Execution Prevention (DEP)

B.

User Account Control (UAC)

C.

Encrypting File System (EFS)

D.

Built-in IPSec Client

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

A.

NTFS gives better file security than FAT16 and FAT32.

B.

Automatic backup.

C.

NTFS file system supports for larger hard disks.

D.

NTFS give improved disk compression than FAT16 and FAT32.

Which of the following is more commonly used for establishing high-speed backbones that interconnect smaller networks and can carry signals over significant distances?

A.

Bluetooth

B.

Ethernet

C.

Token ring

D.

Asynchronous Transfer Mode (ATM)

What method do Unix-type systems use to prevent attackers from cracking passwords using pre-computed hashes?

A.

Unix systems can prevent users from using dictionary words for passwords

B.

The algorithms creates hashes using a CPU- intensive algorithm.

C.

The algorithm creates hashes using salts or randomized values

D.

Unix/Linux systems use hashing functions which cannot be reversed

E.

The system encrypts the password using a symmetrical algorithm

Which of the following is a benefit of using John the Ripper for auditing passwords?

A.

John's Blowfish cracking routine uses a complex central computing loop that increases the cost of each hash computation.

B.

John the Ripper is much slower for auditing passwords encrypted with MD5 and Blowfish.

C.

John's MD5 cracking routine uses a simplified central computing loop that decreases the cost of each hash computation.

D.

John cannot use the DES bit-slicing technique, so it is much slower than other tools, especially when used against DES-encrypted passwords.

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

A.

Host-based intrusion detection system (HIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Server-based intrusion detection system (SIDS)

D.

Network intrusion detection system (NIDS)

If a Linux administrator wanted to quickly filter out extraneous data and find a running process named RootKit, which command could he use?

A.

cat/proc;grep Rootkit

B.

ps-ef/ grep Rootkit

C.

sed’s/Rootkit/g’/var/log/messages

D.

tail/var/log/messages> Rootkit

E.

top-u Rootkit

To be considered a strong algorithm, an encryption algorithm must be which of the following?

A.

Secret

B.

Well-known

C.

Confidential

D.

Proprietary

When discussing access controls, which of the following terms describes the process of determining the activities or functions that an Individual is permitted to perform?

A.

Authentication

B.

Identification

C.

Authorization

D.

Validation

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

A.

nice -n 19 cc -c *.c &

B.

nice cc -c *.c &

C.

nice -n -20 cc -c *.c &

D.

nice cc -c *.c