Filters
Question type

Study Flashcards

What four tasks can be accomplished using NetWare Remote Manager?

Correct Answer

verifed

verified

1. View current connections
2....

View Answer

A(n) ____________________ is a command-line string issued remotely that is intended to weaken the security or to alter an operating system.

Correct Answer

verifed

verified

string signature

What type of intrusion detection monitors the system on which it is loaded?


A) Host-based
B) System-based
C) Network-based
D) Local-based

Correct Answer

verifed

verified

SNMP enables network agents to gather information about network performance and send that information to a network management station.

Correct Answer

verifed

verified

What utility can be used to clean up the Mac OS X Server logs?


A) MacJanitor
B) MacCleanUp
C) MacSweep
D) MacRotate

Correct Answer

verifed

verified

In the Windows 2000 Computer Management tool, what three options under Shared Folders provide information about users currently logged on to the operating system?

Correct Answer

verifed

verified

1. Shares
...

View Answer

The device log records information about system-related events such as hardware errors, driver problems, and hard drive errors.

Correct Answer

verifed

verified

By default in Red Hat Linux 9.x , how many rotation levels does each log file have?


A) 2
B) 3
C) 4
D) 5

Correct Answer

verifed

verified

List eight different types of information that might be found in a log created by an auditor.

Correct Answer

verifed

verified

Any eight of the following: 1. Every time services are started and stopped 2. Every time services are reconfigured or configured incorrectly 3. Hardware events, such as when a peripheral has been activated or if disk space is running out 4. Hardware problems, such as a failing port, disk drive, or other problems 5. Every time files and directories are backed up 6. Events related to network services such as DNS, DHCP, Web servers, and others 7. Every time an operating system has been shut down and rebooted 8. Every logon attempt 9. Every time a file has been accessed 10. Every time permissions are changed on an object 11. Every time a print job has succeeded or failed 12. Network connection events

  Which Netware 6.x log is displayed in the figure above? A)  Access B)  Audit C)  Module D)  Console Which Netware 6.x log is displayed in the figure above?


A) Access
B) Audit
C) Module
D) Console

Correct Answer

verifed

verified

Does the Netware 6.x Console log contain error information recorded for the NetWare server?

Correct Answer

verifed

verified

Match the following terms to the appropriate definition.

Premises
Records specific situations that an administrator wants to be warned about
Sends an alert to an administrator or takes an action to block an attack
Setting up ways to detect and record intrusion attempts, without taking action
A viewing capability that enables you to display only specific events
Used to attract attackers
Examines captured data and determines if there has been an intrusion
Performs a specific function when a predefined situation occurs
Used to detect and report possible network and computer system intrusions
Tracks a wide range of data and events related to an operating system
A message sent to an administrator about a specific operating system event
Responses
Auditor
Passive intrusion detection
Filter
Decoy
Trigger
Inspector
Active intrusion detection
IDS
Alert
Trap

Correct Answer

Records specific situations that an administrator wants to be warned about
Sends an alert to an administrator or takes an action to block an attack
Setting up ways to detect and record intrusion attempts, without taking action
A viewing capability that enables you to display only specific events
Used to attract attackers
Examines captured data and determines if there has been an intrusion
Performs a specific function when a predefined situation occurs
Used to detect and report possible network and computer system intrusions
Tracks a wide range of data and events related to an operating system
A message sent to an administrator about a specific operating system event

In Red Hat Linux, log files are managed through a process called ____________________ .

Correct Answer

verifed

verified

What type of computer is placed on a network to attract attackers?


A) Dummy
B) Honeypot
C) Fake
D) Both a and b
E) Both b and c

Correct Answer

verifed

verified

Which type of IDS automatically records information to a log?


A) Network-based
B) Host-based
C) Auditor
D) Inspector

Correct Answer

verifed

verified

Which Network Monitor pane provides statistics about traffic from other computers on the network, including the MAC (device) address of each computer's NIC and data about the number of frames sent from and received by each computer?


A) Graph
B) Total Statistics
C) Session Statistics
D) Station Statistics

Correct Answer

verifed

verified

C

SYSCON is a Server Console command that is carried forward from earlier versions of NetWare.

Correct Answer

verifed

verified

Which command provides information about who is logged on to Red Hat Linux 9.x?


A) who
B) who am i
C) proc
D) login

Correct Answer

verifed

verified

The Netware 6.x Console Log enables you to trace information, such as NLMs that have been loaded or unloaded, and to trace other activities that have been performed from the console.

Correct Answer

verifed

verified

Which Linux Red Hat 9.x "who" command option shows the amount of time each user process has been idle?


A) -a
B) -b
C) -i
D) -s

Correct Answer

verifed

verified

Showing 1 - 20 of 86

Related Exams

Show Answer