|
Question 1. What should be used to automatically configure host computers for IP (Internet Protocol)? A. DNS (Domain Name Service) B. SNMP (Simple Network Management Protocol) C. SMTP (Simple Mail Transfer Protocol) D. DHCP (Dynamic Host Configuration Protocol) Answer: D Question 2. When attaching to a Windows Network resource, credentials are supplied through the use of a: A. cookie B. cache C. token D. key file Answer: C Question 3. With an umask value of 12, what would be the default permissions assigned to newly created files? A. ---x--x-wx B. -rw-rw-r-- C. -r-xr-xr-- D. -rw-rw---- Answer: B Question 4. Which of the following are categories of web server attacks? A. CGI Intrusions B. Buffer overflows C. Script vulnerability exploits D. All the above Answer: D Question 5. What command do you use to edit the default grace period for quotas? A. quotaconfig -g B. editquota -g C. quotaconfig -t D. edquota -t Answer: D Question 6. Your IP address is 10.10.0.2 and your subnet mask is 255.255.255.0. You have one ethernet card. You want to set your default gateway to be 10.0.0.1. Which of the following is the correct syntax to accomplish this? A. route add default 10.0.01 eth0 B. route add default gw 10.0.01 dev eth0 C. route add default gw 10.0.0.2 eth0 255.255.255.0 D. route add default gw l0.0.0.2/dev/eth0 255.255.255.0 Answer: C Question 7. Which of the following is TRUE then transmitting Secret Information over the network? A. Secret Information should be transmitted in an encrypted form B. Secret Information should be transmitted as a plain-text C. Secret Information should be transmitted in a compressed form D. Secret Information should be transmitted along with user id Answer: A Question 8. An alternate site configured with necessary system hardware, supporting infrastructure and an on site staff able to respond to an activation of a contingency plan 24 hours a day,7 days a week is a A. Hot site B. Cold site C. Warm site D. None of the above Answer: A Question 9. Which of the following is true about authentication? A. Authentication means that information can be accessed when needed by authorized personnel B. Authentication means that passwords can be accessed when needed by authorized personnel C. Authentication means the positive verification of the user/device ma system D. Authentication means that only authorized persons modify information Answer: C Question 10. Zip/Jaz drives, SyQuest, and Bemoulli boxes are very transportable and are often the standard for: A. Data exchange in many businesses B. Data change in many businesses C. Data compression in many businesses D. Data interchange in many businesses Answer: A Question 11. Your company's off site backup facility is intended to operate an information processing facility, having no computer or communications equipment, but having flooring, electrical wiring, air conditioning, etc. This is better known as a____ A. Hot site B. Duplicate processing facility C. Cold site D. Warm site Answer: C Question 12. Which of the following rules related to a Business Continuity Plan/Disaster Recovery Plan is not correct? A. In order to facilitate recovery, a single plan should coverall locations B. There should be requirements for forming a committee to decide a course of action. These decisions should be made ahead of time and incorporated into the plan C. In its procedures and tasks, the plan should refer to functions, not specific individuals D. Critical vendors should be contacted ahead of time to validate equipment that can be obtained in a timely manner Answer: A Question 13. Which of the following c1assify under techno crime? A. Stolen customer account details B. Virus attack C. Server failure D. Hurricane Answer: A Question 14. Which out of the following is/are preventive measures against password sniffing? A. Passwords must not be sent through email in plain text B. Passwords must not be stored in plain text on any electronic media C. Passwords may be electronically stored if encrypted D. All of the above Answer: D Question 15. The most common method of social engineering is: A. Looking through users' trash for information B. Calling users and asking for information C. E-mailing users and asking for information D. E-mail Answer: B Question 16. The full form of IDS is ____________ A. Intrusion Detection System B. Intrusion Deactivation System C. Information Distribution System D. Intrusion Detection Software Answer: A Question 17. What is an Intranet? A. A private network using World Wide Web technology B. A private network using digital telephony services C. A public network using World Wide Web technology D. A public network using digital telephony services Answer: A Question 18. Which of the following is the best description of" separation of duties"? A. Assigning different parts of tasks to different employees B. Employees are canted only the privileges necessary to perform their tasks C. Each employee is granted specific information that is required to carry out the job function D. Screening employees before assigning them to a position Answer: A Question 19. Who is the main person responsible for installation and maintenance of the computer systems? A. Chief Executive Officer B. System Supplier C. System Designer D. Business Process Owner Answer: B Question 20. You have a network address of 196.202.56.0 with four subnets. You want to allow four maximum number of Hosts. What is the subnet mask you need to apply? A. 255.255.255.224 B. 255.255.224.0 C. 255.255.255.128 D. 255.255.255.192 Answer: A
|
Question 1. You want to configure Network Connect to allow users to connect through a tunnel, connect to hosts on the same subnet as their local adapter, and shut down any attempt to extend the network boundaries. How do you proceed? A. Enable split tunneling. B. Disable split tunneling. C. Enable split tunneling with route change monitor. D. Allow access to local subnet with route change monitor. Answer: D Question 2. Which three authentication servers are included with a baseline license? (Choose three.) A. NIS B. ACE C. SAML D. LDAP E. SiteMinder Answer: A, B, D Question 3. You create a set of role mapping rules. You select "Merge settings for all assigned roles." The second role mapping rule has the "Stop processing rules when this rule matches" option selected. A user logs in that matches the first three rules. What happens? A. This is not a valid combination. The system displays an error message and does not update The configuration. B. The merge settings override the stop processing option. The user matches all three roles and merging follows the standard merging criteria. C. The Stop rule prevents any more rule matching after checking the second rule. The merge option only merges the roles of the first two rules following the IVE's built-in permissive merging rules. D. The Stop rule prevents any more rule matching after checking the second rule. The user now just matches the second rule. The merge option is overridden and the user is given only the privileges defined by the second role. Answer: C Question 4. When using the J-SAM, where on a client machine would you look to verify that the loopback addresses are assigned correctly? A. HOSTS file B. ARP cache C. LMHOSTSfile D. local route table Answer: A Question 5. What is Cache Cleaner used for? A. to prevent users from signing in from insecure machines B. to remove content downloaded during the IVE session C. to remove Web content cached by the IVE on behalf of the user D. to determine which files should be cached between remote access sessions Answer: B Question 6. Which role-based session option would an administrator configure to allow a user to connect from different source IP addresses within the same user session? A. roaming session B. persistent session C. persistent password caching D. browser request follow-through Answer: A Question 7. Which two Web Resource Policy features provide you with the capability to configure the IVE to work with corporate Proxy Servers? (Choose two.) A. Web Proxy Policies B. Web Proxy Servers C. Web Cache Policies D. Web Passthrough Proxy Answer: A, B Question 8. Which two statements about SSL VPNs are true? (Choose two.) A. SSL VPNs provide better security than IPSEC. B. SSL VPNs provide a dedicated, point to point connection. C. SSL VPNs provide high performance for individual connections. D. SSL VPNs use well-known technologies for secure individual connections. Answer: C, D Question 9. You are using RADIUS as your authorization server. Other than username, which two attributes are available for creating role mapping rules? (Choose two.) A. Certificate B. User Attribute C. RSA Attributes D. Group Membership Answer: A, B Question 10. Where is the IVE typically deployed in the network? A. behind the Internet firewall B. internally with all clients directly cabled to the IVE C. both interfaces on the outside of the Internet firewall D. parallel to the Internet firewall with one interface on the outside and one on the inside Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.