What is a security feature available with Windows Vista and Windows 7 that was not present in previous Windows operating systems?
You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is more commonly used for establishing high-speed backbones that interconnect smaller networks and can carry signals over significant distances?
What method do Unix-type systems use to prevent attackers from cracking passwords using pre-computed hashes?
Which of the following is a benefit of using John the Ripper for auditing passwords?
Which of the following are the types of intrusion detection systems?
Each correct answer represents a complete solution. Choose all that apply.
If a Linux administrator wanted to quickly filter out extraneous data and find a running process named RootKit, which command could he use?
To be considered a strong algorithm, an encryption algorithm must be which of the following?
When discussing access controls, which of the following terms describes the process of determining the activities or functions that an Individual is permitted to perform?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?