Quiz 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Of the following methods, which one acts as a middleman between an external network and the private network by initiating and establishing the connection? Proxy server Firewall Router Switch

Proxy server

Which permission value in Linux allows for read and execute? 5 7 4 1

5

Which best describes a vulnerability scan? A way to find open ports A way to diagram a network Xmas tree A proxy attack A way to automate the discovery of vulnerabilities

A way to automate the discovery of vulnerabilities

A crystal-box test means the tester has which of the following? No knowledge Some knowledge Complete knowledge Permission

Complete knowledge

Which report would be best given to a client's senior leadership team? Analysis report Project summary report Executive summary report Chapter summary report

Executive summary report

What is the process of making an operating system secure from attack called? Hardening Tuning Sealing Locking down

Hardening

An administrator has just been notified of irregular network activity. What appliance functions in this manner? IPS Stateful packet filtering IDS Firewall

IDS

What does the stateful inspection provide to the network administrator? It tracks all communications streams and the packets are inspected It provides the administrator with a slower network response It ensures that communications are terminated It provides the administrator with reduced admin work

It tracks all communications streams and the packets are inspected

Which technology allows the use of a single public address to support many internal clients while also preventing exposure of internal IP address to the outside world? VPN Tunneling NTP NAT

NAT

In Linux, how would you create a new user in terminal? #useradd /home/samarea ssamarea >useradd raeleah cuser ray_j /hom/ray_j # useradd savion

# useradd savion

What command is used to listen to open ports with netstat? $netstat -an $netstat -ports $netstat -n $netstats -s

$netstat -an

What item should not be included in the Rules of engagement? Test dates and times Permission to test Contact information Daily debriefing conference call

Permission to test

What command would you use to give read, write, and execute privileges for an object to the owner, group and others in Linux? chmod 666 chmod 777 chmod 7 chmod 532

chmod 777

What command displays the network configuration in Linux os?

ifconfig

What command can you use to switch to a different user in Linux? swu user sudo su

su

In Linux, what designator is used to uniquely identify a user account? GID SID UID PID

UID

Which of the following denoted the root directory in a Linux system? root/ / home/ /home/

/

Where is the event log located in Linux OS? /home/log /var/log /log/ /jome/system32/log

/var/log


संबंधित स्टडी सेट्स

Information Systems Today MIS Homework Ch. 6 Questions

View Set

Accounting 1 Chapter 4 true or false

View Set

Accounting final exam missed questions

View Set

Religión Cap 8- Libres para el Bien

View Set

Science Chapters 1-4 True or False

View Set