Filters
Question type

Study Flashcards

Gathering performance statistics each time a new software application is installed, on slow, average, and peak periods during its use, and tracking how many users are on that software is an example of acquiring a _____.


A) baseline
B) framework
C) foundation
D) utilization level

Correct Answer

verifed

verified

In the event log, a notice that a service has started would be indicated with what type of symbol?


A) A blue "i" displayed in a white comment bubble
B) A black "!" that appears on a yellow caution symbol
C) A white "x" that appears inside a red circle
D) A red "x" that appears inside a white circle

Correct Answer

verifed

verified

Which Network Monitor statistic shows total traffic in frames for broadcasts, unicasts, and multicasts?


A) % Network Utilization
B) Frames Per Second
C) Broadcasts Per Second
D) Muticasts Per Second

Correct Answer

verifed

verified

Network-based intrusion-detection software is used on a computer or network device and typically places the NIC on that device in ____________________ mode.

Correct Answer

verifed

verified

In Mac OS X, the FTP Log keeps track of file uploads, downloads, and communications with FTP servers.

Correct Answer

verifed

verified

In Windows Server 2003 event viewer, an informational message such as a notice that a service has been started is prefaced by a black "!" (exclamation point) that appears on a yellow caution symbol.

Correct Answer

verifed

verified

Is the Process Viewer used by Linux Red Hat 9.x to display a listing of processes and the users who are running those processes?

Correct Answer

verifed

verified

At minimum, active intrusion detection alerts a server or network administrator about an attack or intrusion, so the administrator can take action.

Correct Answer

verifed

verified

In Network Monitor the capture store is the amount of RAM and virtual memory that is used to store captured data.

Correct Answer

verifed

verified

Are the Server logs for Mac OS X automatically rotated?

Correct Answer

verifed

verified

File locks are open communication links between two processes on the server or between the server and a client.

Correct Answer

verifed

verified

In Windows Server 2003, the ____________________ log records information about logon accesses and file, folder, and system policy changes.

Correct Answer

verifed

verified

In Red Hat Linux, the Emacs and vi editors can be used to configure the syslog.conf file.

Correct Answer

verifed

verified

Which passive intrusion-detection tool audits activities on multiple operating systems, filters them, and collects the information into one large database for analysis of intrusions?


A) loginlog
B) lsof
C) PreCis
D) RealSecure

Correct Answer

verifed

verified

Which of the following are examples of active intrusion-detection tools?


A) klaxon
B) lsof
C) AppShield
D) RealSecure

Correct Answer

verifed

verified

An inspector is an IDS that tracks a full range of data and events related to an operating system or network.

Correct Answer

verifed

verified

Understanding the normal conditions for operating systems and a network is accomplished by establishing baselines .

Correct Answer

verifed

verified

Which of the following activities are usually looked for using passive intrusion-detection tools?


A) Unusual or excessive e-mail traffic
B) Changes to security
C) Unplanned system shutdowns
D) Port scans
E) All of the above

Correct Answer

verifed

verified

In event log, a warning that a CD-ROM is not loaded would be indicated by what type of symbol?


A) A blue "i" displayed in a white comment bubble
B) A black "!" that appears on a yellow caution symbol
C) A white "x" that appears inside a red circle
D) A red "x" that appears inside a white circle

Correct Answer

verifed

verified

What two useful tools does NetWare offers to view user connections?

Correct Answer

verifed

verified

MONITOR an...

View Answer

Showing 41 - 60 of 86

Related Exams

Show Answer