Which of the following terms refers to the process of establishing a standard for security?
Baselining
Security evaluation
Hardening
Methods research
You've been chosen to lead a team of administrators in an attempt to increase security. You're currently creating an outline of all the aspects of security that will need to be examined and acted upon. Which of the following terms describes the process of improving security in an NOS?
Common Criteria
Hardening
Encryption
Networking
What is the method of establishing a protocol connection to a controller called?
Linkage
Networking
Binding
Access control
You're evaluating the protocols in use on your network. After evaluation, you'll make a recommendation to the vice president of IT on protocols that should be removed from the systems. Which of the following protocols shouldn't be bound to TCP/IP, if at all possible, because it's a well-established target of attackers?
IPX/SPX
SMTP
NetBIOS
LDAP
What tool is used in Windows Vista to encrypt an entire volume?
Bitlocker
Syslock
Drive Defender
NLock
Your organization has created a new overseer position, and licensing has suddenly become an issue. Licenses need to be in existence and able to be readily produced for all proprietary software. Which of the following operating systems is an open-source product and not considered proprietary?
Windows 2000
Novell NetWare
Linux
Mac OS
Which filesystem was primarily intended for desktop system use and offers limited security?
NTFS
NFS
FAT
AFS
Your company has acquired a competitor's business. You've been assigned the role of formulating a strategy by which the servers on your existing network will communicate with those on the newly acquired network. All you know about the competitor is that it's using Novell's newest filesystem and it's a proprietary environment for servers. Which filesystem is used in NetWare servers?
NSS
NTFS
AFS
FAT
Which filesystem allows remote mounting of filesystems?
NTFS
FAT
AFS
NFS
The administrator at MTS was recently fired, and it has come to light that he didn't install updates and fixes as they were released. As the newly hired administrator, your first priority is to bring all networked clients and servers up-to-date. What is a bundle of one or more system fixes in a single product called?
Service pack
Hotfix
Patch
System install
Which of the following statements is not true?
You should never share the root directory of a disk.
You should share the root directory of a disk.
You should apply the most restrictive access necessary for a shared directory.
Filesystems are frequently based on hierarchical models.
Your company does electronic monitoring of individuals under house arrest around the world. Because of the sensitive nature of the business, you can't afford any unnecessary downtime. What is the process of applying a repair to an operating system while the system stays in operations called?
Upgrading
Service pack installation
Hotfix
File update
What is the process of applying manual changes to a program called?
Hotfix
Service pack
Patching
Replacement
A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?
ACLs provide individual access control to resources.
ACLs aren't used in modern systems.
The ACL process is dynamic in nature.
ACLs are used to authenticate users.
What product verifies that files being received by an SMTP server contain no suspicious code?
E-mail virus filter
Web virus filter
Packet filter firewall
IDS
Users are complaining about name resolution problems suddenly occurring that were never an issue before. You suspect that an intruder has compromised the integrity of the DNS server on your network. What is one of the primary ways in which an attacker uses DNS?
Network footprinting
Network sniffing
Database server lookup
Registration counterfeiting
Your company is growing at a tremendous rate, and the need to hire specialists in various areas of IT is becoming apparent. You're helping to write the newspaper ads that will be used to recruit new employees, and you want to make certain that applicants possess the skills you need. One knowledge area in which your organization is weak is database intelligence. What is the primary type of database used in applications today that you can mention in the ads?
Hierarchical
Relational
Network
Archival
The flexibility of relational databases in use today is a result of which of the following?
SQL
Hard-coded queries
Forward projection
Mixed model access
You're redesigning your network in preparation for putting the company up for sale. The network, like all aspects of the company, needs to perform the best that it possibly can in order to be an asset to the sale. Which model is used to provide an intermediary server between the end user and the database?
One-tiered
Two-tiered
Three-tiered
Relational database
18.116.47.25