Which of the following is a valid password for a system with the default "Password must meet complexity requirements" setting enabled as part of the GPO Password policy requirements?
A. The Cat Chased its Tail AII Night
B. disk ACCESS failed
C. SETI@HOME
D. SaNS2006
A database is accessed through an application that users must authenticate with, on a host that only accepts connections from a subnet where the business unit that uses the data is located. What defense strategy is this?
A. Information Centric
B. Threat Modeling
C. Uniform Production
D. Vector Oriented
Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?
A. Anomaly detection
B. Vulnerability scanning
C. Perimeter assessment
D. Penetration testing
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux- based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
A. killall
B. ps
C. getpid
D. kill
Which of the following defines the communication link between a Web server and Web applications?
A. CGI
B. PGP
C. Firewall
D. IETF
On which of the following OSI model layers does IPSec operate?
A. Physical layer
B. Network layer
C. Data-link layer
D. Session layer
Which Windows event log would you look in if you wanted information about whether or not a specific diver was running at start up?
A. Application
B. System
C. Startup
D. Security
Which of the following BEST describes the two job functions of Microsoft Baseline Security Analyzer (MBSA)?
A. Vulnerability scanner and auditing tool
B. Auditing tool and alerting system
C. Configuration management and alerting system
D. Security patching and vulnerability scanner
What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?
A. Template application should be done remotely
B. Templates must be received from a domain controller
C. Template application requires domain administrator rights
D. Template application cannot be automatically reversed
What would the file permission example "rwsr-sr-x" translate to in absolute mode?
A. 1755
B. 6755
C. 6645
D. 1644