|
Question 1.
In a Linux system, how do you stop the POP3, IMAPD, and FTP services?
A. By changing the permissions on the configuration file that controls the service (/sbin/inetd), then recompiling /etc/inetd.config
B. By commenting out the service using the # symbol in the text file /etc/inetd.conf, then restarting the inetd daemon
C. By recompiling the system kernel, making sure you have disabled that service
D. By commenting out the service using the $ symbol in the text file /etc/inetd.conf, then restarting the inetd daemon.
Answer: B
Explanation:
Use the # symbol to comment out the service, and then restart inetd.
Incorrect Answers:
A: If this made any sense, you would also lock out the WWW service and disable the Web Server, which is not want you want to do here. Inetd.conf does not get compiled.
C: The services for inetd are loaded based on the control cards in the text file. It is not specified in the kernel, so recompiling it will not accomplish stopping the services.
D: The comment symbol is a #, not a $.
Question 2.
Which of the following choices lists the ports that Microsoft internal networking uses that should be blocked from outside access?
A. UDP 137 and 138, and TCP 139
B. Ports 11, 112, and 79
C. UDP 1028, 31337 and 6000
D. Port 80, 134 and 31337
Answer: A
Explanation:
UDP & TCP 137 are used for NETBIOS name service. UDP 138 is used for the NETBIOS Datagram Service, and TCP 139 is used for the NETBIOS Session Service. Internal networking for Microsoft Windows systems uses NETBIOS for its redirector. Hacking into the Windows systems would be blocked if NETBIOS could not pass through the firewall. To logon to Windows, or access file or printer shares, access will have to be done via SMB (Service Message Blocks) which ride on NETBIOS.
Incorrect Answers:
B: 11 is systat, 112 is not used, and 79 is finger. Although you might want to block out these ports, including port 79 (finger) which can expose server information to a hacker, these are not part of Microsoft internal networking.
C: These ports are outside of the well known ports, and blocking them does not close any holes. These ports are not part of Microsoft internal networking.
D: Port 80 is HTTP, so to block it disables web browsing. Port 134 is not assigned to a service, and port 31337 is not a well known port. These ports are not part of Microsoft internal networking.
Question 3.
What is the best way to keep employees on a LAN from unauthorized activity or other mischief?
A. Reduce each user’s permissions to the minimum needed to perform the tasks required by his or her job
B. Limit the number of logins available to all users to one at a time
C. Limit the number of files that any one user can have open at any given time
D. Implement a zero-tolerance policy in regard to employees who load games or other unauthorized software on the company's computers
Answer: A
Explanation:
Obviously you don’t give the employees free roam of the LAN. Accidents can happen (type a file name or file path wrong) or some employees may become curious. By giving them only the permissions that they need to do their job, can drastically limit where those users can go and cause damage.
Incorrect Answers:
B: The objective in the question is how to prevent an employee from unauthorized activity. Having multiple logons does cause some security concerns, but not that of the user. As long as the permissions are locked up tight, it won't matter how many logons the user has, if one can't get unauthorized access, then none should
C: To limit the number of open files does not prevent this activity, and may prevent the user from actually doing work. Some programs will open multiple files, most programs open more than one file.
D: This is a good step and policy to implement. It still does not prevent unauthorized activity of corporate assets.
Question 4.
What is a spoofing attack?
A. A hacker pretends to be the superuser and spoofs a user into allowing him into the system
B. A hacker calls a user and pretends to be a system administrator in order to get the user’s password
C. A computer (or network) pretends to be a trusted host (or network)
D. A hacker gains entrance to the building where the network resides and accesses the system by pretending to be an employee
Answer: C
Explanation:
Spoofing is usually when you change your identity to portray yourself as someone else. One example is to change the source IP address in an IP packet to make it appear that the packet was sent by someone else.
Incorrect Answers:
A: The program that acts as another program is not called spoofing. This technique is called man in the middle.
B: This is called social engineering.
D: This is called social engineering.
Question 5.
Abjee is going to log on to his network. His network does not employ traffic padding mechanisms. Why will it be easy for someone to steal his password?
A. Because his password could be more than two weeks old
B. Because of he predictability of the length of the login and password prompts
C. Because the Cleartext user name and password are not encrypted
D. Because there is no provision for log analysis without traffic padding, thus no accountability when passwords are lost
Answer: B
Explanation:
By monitoring the size of the packets, it could be determined the password length. This makes brute force attacks easier to conduct, since you can eliminate passwords that are shorter or longer than the detected amount. Another issue on padding is timing. Suppose the successful password took longer to process, but the failed password gave a quick response. Using this timing, a hacker could determine whether a password would work just based on the response time of the login. If bad logons were padded out so they look the same elapsed time as a successful login, then this guessing and analysis could not be done.
Incorrect Answers:
A: Traffic padding would not protect a password based on the age of the password.
C: Passwords that are encrypted will still be the same length, because encryption is not compression. So it does not matter whether the password is in the clear or encrypted, the key here is to prevent guessing of the password length to make password guessing more difficult.
D: Log analysis is not related to traffic padding. The passwords would not even be logged, as that causes potential exposure of gaining access to the passwords, should the log file be compromised.
|
Question 1. Which four statements describe the role of Back-to-Back Orders? (Choose Four.) A. Links sales orders and purchase orders B. Flow of reservation supply from requisition toPO to inventory C. Auto Creates requisitions D. Supplier ships directly to customer E. Pegs supply to demand Answer: A, B, C, E Question 2. Which two statements are true about freight and special charges modifiers? (Choose two.) A. All freight and special charges are passed to receivables for invoicing B. Using freight and special charges modifiers, you can apply different freight C. Freight and special charges can't be manually overridden D. Only shipping execution can capture freight costs and apply charges Answer: A, B Question 3. James wants to add a new recipient to the Approvals list for seeded Negotiation Flow with Approvals. Which two statements are true? (Choose two.) A. The seeded workflow list of approvers can't be modified B. He should open the seeded workflow and add the new name there C. He can't modify the seeded list, so he should create a new workflow D. He should select Setup>Transaction Types, query the appropriate Transaction Type and the click the Approvals button. Finally, he should add the recipient to the list of Approves for the appropriate list name E. He should select Setup> Transaction Types> Approvals and add the recipient to the list of Approves for the appropriate list name Answer: D, E Question 4. Which two statements are true about one-step shipping? (Choose two.) A. One-step shipping must be used with quick ship shipping transactions B. One-step shipping is the process of ensuring lot controls are shipped appropriately C. Ship confirm rules must be set up in order to use one-step shipping D. One-step shipping is the process of picking, optionally packing and ship confirming delivery lines in one step Answer: C, D Question 5. Certpaper.com is a retail company and all its customer orders that are shipped have a pre defined freight charge for each line item on the order. The company wants to apply the freight charge to the sales order automatically to increase the order amount. What should ABC do? A. They can't do this; freight charges can be applied only during the ship confirm process B. A Freight and Special Charges modifier can't be defined to apply the freight charge at the time of the sales order C. Automatic Freight and Special Charges modifier to apply at each sales order line D. Define the surcharge list type of modifier to automatically apply the freight charge at the time of the sales order E. Manual Freight and Special Charges modifiers to apply at each sales order line Answer: C Question 6. What is true about the Ship From Stock fulfillment model? A. Every order line should create a WIP job of equivalent quantity B. Every order must be reserved C. Stock is not shipped from the factory to the warehouse until receipt of the order D. Every order can be pick released almost immediately after booking Answer: D Question 7. Certpaper.com. runs on the PTO fulfillment model. All the rule-based business rules for configuration the model are incorporated using OracleConfigurator, which makes it intuitive for sales representatives to configure the PTO model. Which two statements are true? (Choose two.) A. After selecting all the options, PTO Model needs to be processed to get the configured part B. Routing needs to be defined for the PTO model C. Ship confirm the option items, not the PTO model and option class D. Process the configured item to generate the work order E. Based on the setup, either ship model complete or individual options Answer: C, E Question 8. Which three statements are true about freight carriers? (Choose three.) A. Inter-organization transfer uses an associated General Ledger account to specify the freight cost B. Freight carriers are used for shipments to and from customer, supplier and internal organizations C. Freight carriers are specific to the inventory organization D. You can't associate the General Ledger account with each freight to collect associated costs E. Freight carriers are used only for customer shipments Answer: A, B, C Question 9. Mary wants to perform the Pick Release process for delivery lines that have been booked. Which three options are valid approaches for her to use? (Choose three.) A. Run the Auto Allocate process B. Execute online from the release sales order window C. Run a concurrent program from the release sales order window D. Use the standard Report submission process E. Run the Pick Slip Grouping process Answer: B, C, D Question 10. A user has been tasked with ensuring that Credit Checking is done at the time of Sales Order Booking for ABC Corp. Though she believes she set up everything correctly, no credit checks seem to be occurring. Which three elements should be check? (Choose three.) A. Is Credit Checking enabled for the payment terms applied to ABC Corp? B. Is the Credit check box selected in the standard customer setup for ABC Corp? C. Is credit check selected at booking on the Order Transaction Type setup used for ABC Corps orders? D. Is the credit check hold check box selected in the profile class accounts window for ABC Corp? E. Is credit check selected at shipping on the order transaction type setup used for ABC Corps orders? Answer: A, B, C
|
Question 1. Which of these can you use to determine whether there is network connectivity between your computer and a web server on the Internet? A. Whois B. Finger C. Lookup D. Traceroute Answer: D Question 2. You are an admin user, and have enabled the Ignore Volume Ownership option for an external FireWire hard disk. What will happen the next time a standard user attempts to mount the disk? A. The disk will mount, and the user will be able to read, modify, and delete any file on the disk. B. The disk will mount, and the user will be able to read any file on the disk; the user will be required to enter an administrator password to modify or delete files on the disk. C. The user will be required to enter an administrator password to mount the disk; once the disk is mounted the user will be able to read, modify, and delete any file on the disk. D. The user will be required to enter an administrator password to mount the disk; once the disk is mounted, the user will be able to read any file on the disk, but will be required to re-enter an administrator password to modify or delete files. Answer: A Question 3. Review the screenshot of a user's home folder, and then answer the question below. Which folder did the user create? A. Music B. Pages C. Pictures D. Downloads Answer: B Question 4. Mac OS X v10.5 can read files on a volume that is ________-formatted, but it cannot write to files on the volume. A. UFS B. NTFS C. EXT2 D. FAT32 Answer: B Question 5. Which procedure will let someone who does not have a local user account log in to a local admin user account on a Mac OS X v10.5 computer that does NOT have a firmware password enabled? A. Log in to the computer with the user name "root" and the master password, open Accounts preferences, and reset the admin user password. B. Remove a RAM DIMM from one of the computers RAM slots, restart the computer while holding down the Command-Option-O-F keys until you hear the startup sound, then type "reset-all" at the prompt. C. Start the computer from the internal hard disk, log into a guest user account, open the Reset Password utility in the /Applications/Utilities folder, then reset the password on the admin user account that resides on the hard disk volume. D. Press the C key while restarting the computer with the Mac OS X v10.5 Install DVD inserted, then choose Reset Password from the Utilities menu. Select the hard disk volume and the admin user account, then enter a new password for the account and click Save. Answer: D Question 6. You have configured your Mac OS X v10.5 computer to share its connected USB printer. Mac OS X users can locate and print to it, but Windows users can not. What additional step must you take to allow Windows users to print to it? A. In Sharing preferences, enable file sharing over SMB. B. In Print & Fax preferences, enable the SMB printer driver. C. In Printer Setup Utility, enable Windows Printing from the Printers menu. D. In Print & Fax preferences, configure the Windows Printer name and queue. Answer: A Question 7. Review the screenshots of a files permissions, as seen in Finder and from Terminal, and then answer the question below. Why are Kim's permissions to the file, Report.rtf, NOT visible in the Terminal listing? A. Kims permissions are stored as POSIX settings. B. Kims permissions are stored in the volume catalog. C. Kims permissions are stored in the file data segment. D. Kims permissions are stored in an Access Control List (ACL). Answer: D Question 8. Tom wants to share a document with Harriet. Both have standard user accounts on the same Mac OS X v10.5 computer. Which of these is NOT a location where Tom can store the document so that Harriet can read it? A. /Users/Shared/ B. /Users/tom/Public/ C. /Users/harriet/Public/ D. /Users/harriet/Public/Drop Box/ Answer: C Question 9. The primary role of the master password in Mac OS X v10.5 is to let you ________. A. Access all the passwords stored in a local keychain B. Reset the password of an account that has FileVault enabled C. Change the startup device by holding down the Option key while the computer starts up D. Connect to any password-protected web server whose password is stored in a local keychain Answer: B Question 10. Which statement identifies a potential effect of resetting the master password for a Mac OS X v10.5 computer? A. Users with keychain files created before you changed the master password must use the old master password to unlock their keychains. B. Users who enabled FileVault before you changed the master password will not be able to access their home folder if they have forgotten their account password. C. Users with keychain files created before you changed the master password will have their keychain passwords automatically updated to match the new master password. D. Users whose accounts were created before you changed the master password must use the firmware password to access their home folder if they have forgotten their account password. Answer: B
|
Question 1. You are configuring the eri0 network interface using the ifconfig command with the options netmask + and subnet mask 255.255.255.0. # /usr/sbin/ifconfig eri0 netmask + To verify the system is properly set up you issue an ifconfig -a command. You notice that the eri0 network interface has the netmask incorrectly set for 255.255.0.0. Which file do you need to check first? A. /etc/hosts B. /etc/netmasks C. /etc/hostname.eri0 D. /etc/nsswitch.conf Answer: B Question 2. You are installing a StorEdge A3500. You have created 5 LUNS, but after a boot -r can only see one of them in the format output. What should you modify/run to increase the single LUN issue? A. /kernel/drv/rdriver.conf B. /etc/osa/rmparams C. /kernel/drv/sd.conf D. /usr/lib/osa/bin/symconf Answer: C Question 3. You replaced a failed system board on a Sun Fire E20K. The new system board has no memory and needs to be tested. How should you test the new board? A. Add the line ?$GGWKHOLQHno_memory_ok?in the postrc file. B. Use the option -m with hpost command. C. You need memory in a system board to test it. D. Add the line ?$GGWKHOLQHmemory_ok?in the postrc file. Answer: A Question 4. You have completed repairs on a Sun Fire E25K and the next step is to run extended POST to verify the service action. How can you run extended post level 32 on domain A only? A. Enter level 32 in the /etc/opt/SUNWSMS/config/.postrc file. B. Enter level 32 in the /etc/opt/SUNWSMS/config/A/.postrc file. C. Enter 2 in the /etc/opt/SUNWSMS/config/A/.postrc file. D. Enter 2 in the /etc/opt/SUNWSMS/config/.postrc file. Answer: B Question 5. A customer wants to install four domains on their Sun Fire 6900. What needs to be configured using the setupplatform command on the System Controller? A. COD for all domains B. System controller failover C. ACL's for all domains D. Dual partitioning Answer: D Question 6. You have installed a Sun Enterprise 5500 onto a customer's network. The customer's networking department has told you that you must force the production interface, qfe0, to 100Mbps, Full Duplex. Which two ndd commands will you need to add to your startup script to ensure that your interface is running at the correct settings? (Choose two.) A. ndd -set /dev/qfe autoneg_cap 0 B. ndd -set /dev/qfe adv_100fdx_cap 1 C. ndd -set /dev/qfe link_mode 1 D. ndd -set /dev/qfe 100fdx_cap 1 E. ndd -set /dev/qfe link_speed 1 Answer: A, B Question 7. You install a system to customer specifications and after rebooting you get the following message: NIS server not responding for... retrying The customer tells you that there is a network problem which prevents this machine from reaching the NIS server. You boot the machine into single user mode. What action should you take to allow the system to operate until the NIS server is reachable again? A. Edit /etc/nsswitch.conf so that file is first for all entries and reboot into multiuser mode. B. Copy /etc/nsswitch.files to /etc/nsswitch.conf and reboot into multiuser mode. C. Edit /etc/resolv.conf so that the domain entry is commented out and reboot into multiuser mode. D. Rename /etc/rc2.d/S72inetsvc to /etc/rc2.d/DisabledS72inetsvc and reboot into multiuser mode. Answer: B Question 8. You have performed a setkeyswitch on for domain A on a Sun Fire 6800 where the auto-boot? OBP variable is set to false. What command at the OBP should you run to find the status of the POST? A. show-post-results B. showlog-results C. show-log-results D. showlog results E. showpost-results F. showpost results Answer: A Question 9. A customer has been receiving the following message: unix: WARNING: /tmp: File system full, swap space limit exceeded You are asked to create a swapfile to increase swap space. The swap file specifications are: - File name: swap1 - Destination directory: /delta - Length of swap1: 20 Megabytes Which command should you use to create the swap file? A. mkfile 20m /delta/swap1 B. mkfile -a 20m /delta/swap1 C. swap -a 20m /delta/swap1 D. swap 20m /delta/swap1 Answer: A Question 10. A customer has a number of Sun Fire 25Ks and you need to identify which one to work on. You are in the data center but not at the keyboard. Which command should you ask the customer to run to determine the chassis serial number? A. showplatform B. showcsn C. showenvironment D. showserial Answer: A
|
Question 1. Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network? A. Change the default community string names B. Block all internal MAC address from using SNMP C. Block access to UDP port 171 D. Block access to TCP port 171 Answer: A Question 2. At what layer of the OSI model do routers function on? A. 3 B. 4 C. 5 D. 1 Answer: A Question 3. An "idle" system is also referred to as what? A. Zombie B. PC not being used C. Bot D. PC not connected to the Internet Answer: A Question 4. What operating system would respond to the following command? A. Mac OS X B. Windows XP C. Windows 95 D. FreeBSD Answer: D Question 5. Why are Linux/Unix based computers better to use than Windows computers for idle scanning? A. Windows computers will not respond to idle scans B. Linux/Unix computers are constantly talking C. Linux/Unix computers are easier to compromise D. Windows computers are constantly talking Answer: D Question 6. How many bits is Source Port Number in TCP Header packet? A. 48 B. 32 C. 64 D. 16 Answer: D Question 7. Why are Linux/Unix based computers better to use than Windows computers for idle scanning? A. Windows computers are constantly talking B. Linux/Unix computers are constantly talking C. Linux/Unix computers are easier to compromise D. Windows computers will not respond to idle scans Answer: A Question 8. Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here? A. Enumerate all the users in the domain B. Perform DNS poisoning C. Send DOS commands to crash the DNS servers D. Perform a zone transfer Answer: D Question 9. You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test." What is the result of this test? A. Your website is vulnerable to web bugs B. Your website is vulnerable to CSS C. Your website is not vulnerable D. Your website is vulnerable to SQL injection Answer: B Question 10. After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that? A. RestrictAnonymous must be set to "2" for complete security B. RestrictAnonymous must be set to "3" for complete security C. There is no way to always prevent an anonymous null session from establishing D. RestrictAnonymous must be set to "10" for complete security Answer: A
|
plz ad it thanks
|
u must visit this site thanks
|
thanks buddy
|
u must visit itcertkeys.com thansk
|
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.