5.9. Review Questions

  1. Which of the following terms refers to the process of establishing a standard for security?

    1. Baselining

    2. Security evaluation

    3. Hardening

    4. Methods research

  2. You've been chosen to lead a team of administrators in an attempt to increase security. You're currently creating an outline of all the aspects of security that will need to be examined and acted upon. Which of the following terms describes the process of improving security in an NOS?

    1. Common Criteria

    2. Hardening

    3. Encryption

    4. Networking

  3. What is the method of establishing a protocol connection to a controller called?

    1. Linkage

    2. Networking

    3. Binding

    4. Access control

  4. You're evaluating the protocols in use on your network. After evaluation, you'll make a recommendation to the vice president of IT on protocols that should be removed from the systems. Which of the following protocols shouldn't be bound to TCP/IP, if at all possible, because it's a well-established target of attackers?

    1. IPX/SPX

    2. SMTP

    3. NetBIOS

    4. LDAP

  5. What tool is used in Windows Vista to encrypt an entire volume?

    1. Bitlocker

    2. Syslock

    3. Drive Defender

    4. NLock

  6. Your organization has created a new overseer position, and licensing has suddenly become an issue. Licenses need to be in existence and able to be readily produced for all proprietary software. Which of the following operating systems is an open-source product and not considered proprietary?

    1. Windows 2000

    2. Novell NetWare

    3. Linux

    4. Mac OS

  7. Which filesystem was primarily intended for desktop system use and offers limited security?

    1. NTFS

    2. NFS

    3. FAT

    4. AFS

  8. Your company has acquired a competitor's business. You've been assigned the role of formulating a strategy by which the servers on your existing network will communicate with those on the newly acquired network. All you know about the competitor is that it's using Novell's newest filesystem and it's a proprietary environment for servers. Which filesystem is used in NetWare servers?

    1. NSS

    2. NTFS

    3. AFS

    4. FAT

  9. Which filesystem allows remote mounting of filesystems?

    1. NTFS

    2. FAT

    3. AFS

    4. NFS

  10. The administrator at MTS was recently fired, and it has come to light that he didn't install updates and fixes as they were released. As the newly hired administrator, your first priority is to bring all networked clients and servers up-to-date. What is a bundle of one or more system fixes in a single product called?

    1. Service pack

    2. Hotfix

    3. Patch

    4. System install

  11. Which of the following statements is not true?

    1. You should never share the root directory of a disk.

    2. You should share the root directory of a disk.

    3. You should apply the most restrictive access necessary for a shared directory.

    4. Filesystems are frequently based on hierarchical models.

  12. Your company does electronic monitoring of individuals under house arrest around the world. Because of the sensitive nature of the business, you can't afford any unnecessary downtime. What is the process of applying a repair to an operating system while the system stays in operations called?

    1. Upgrading

    2. Service pack installation

    3. Hotfix

    4. File update

  13. What is the process of applying manual changes to a program called?

    1. Hotfix

    2. Service pack

    3. Patching

    4. Replacement

  14. A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?

    1. ACLs provide individual access control to resources.

    2. ACLs aren't used in modern systems.

    3. The ACL process is dynamic in nature.

    4. ACLs are used to authenticate users.

  15. What product verifies that files being received by an SMTP server contain no suspicious code?

    1. E-mail virus filter

    2. Web virus filter

    3. Packet filter firewall

    4. IDS

  16. Users are complaining about name resolution problems suddenly occurring that were never an issue before. You suspect that an intruder has compromised the integrity of the DNS server on your network. What is one of the primary ways in which an attacker uses DNS?

    1. Network footprinting

    2. Network sniffing

    3. Database server lookup

    4. Registration counterfeiting

  17. LDAP is an example of which of the following?

    1. Directory access protocol

    2. IDS

    3. Tiered model application development environment

    4. File server

  18. Your company is growing at a tremendous rate, and the need to hire specialists in various areas of IT is becoming apparent. You're helping to write the newspaper ads that will be used to recruit new employees, and you want to make certain that applicants possess the skills you need. One knowledge area in which your organization is weak is database intelligence. What is the primary type of database used in applications today that you can mention in the ads?

    1. Hierarchical

    2. Relational

    3. Network

    4. Archival

  19. The flexibility of relational databases in use today is a result of which of the following?

    1. SQL

    2. Hard-coded queries

    3. Forward projection

    4. Mixed model access

  20. You're redesigning your network in preparation for putting the company up for sale. The network, like all aspects of the company, needs to perform the best that it possibly can in order to be an asset to the sale. Which model is used to provide an intermediary server between the end user and the database?

    1. One-tiered

    2. Two-tiered

    3. Three-tiered

    4. Relational database

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.101.95