CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [140]
4. View the contents of the networks file by typing cat networks. This file lists the known networks with which this host can communicate.
5. Exit the command line.
Review Questions
1. Which of the following terms refers to the process of establishing a standard for security?
a. Baselining
b. Security evaluation
c. Hardening
d. Methods research
2. You’ve been chosen to lead a team of administrators in an attempt to increase security. You’re currently creating an outline of all the aspects of security that will need to be examined and acted upon. Which of the following terms describes the process of improving security in an NOS?
a. Common Criteria
b. Hardening
c. Encryption
d. Networking
3. What is the method of establishing a protocol connection to a controller called?
a. Linkage
b. Networking
c. Binding
d. Access control
4. You’re evaluating the protocols in use on your network. After evaluation, you’ll make a recommendation to the vice president of IT on protocols that should be removed from the systems. Which of the following protocols shouldn’t be bound to TCP/IP, if at all possible, because it’s a well-established target of attackers?
a. IPX/SPX
b. SMTP
c. NetBIOS
d. LDAP
5. What tool is used in Windows Vista to encrypt an entire volume?
a. Bitlocker
b. Syslock
c. Drive Defender
d. NLock
6. Your organization has created a new overseer position, and licensing has suddenly become an issue. Licenses need to be in existence and able to be readily produced for all proprietary software. Which of the following operating systems is an open-source product and not considered proprietary?
a. Windows 2000
b. Novell NetWare
c. Linux
d. Mac OS
7. Which filesystem was primarily intended for desktop system use and offers limited security?
a. NTFS
b. NFS
c. FAT
d. AFS
8. Your company has acquired a competitor’s business. You’ve been assigned the role of formulating a strategy by which the servers on your existing network will communicate with those on the newly acquired network. All you know about the competitor is that it’s using Novell’s newest filesystem and it’s a proprietary environment for servers. Which filesystem is used in NetWare servers?
a. NSS
b. NTFS
c. AFS
d. FAT
9. Which filesystem allows remote mounting of filesystems?
a. NTFS
b. FAT
c. AFS
d. NFS
10. The administrator at MTS was recently fired, and it has come to light that he didn’t install updates and fixes as they were released. As the newly hired administrator, your first priority is to bring all networked clients and servers up-to-date. What is a bundle of one or more system fixes in a single product called?
a. Service pack
b. Hotfix
c. Patch
d. System install
11. Which of the following statements is not true?
a. You should never share the root directory of a disk.
b. You should share the root directory of a disk.
c. You should apply the most restrictive access necessary for a shared directory.
d. Filesystems are frequently based on hierarchical models.
12. Your company does electronic monitoring of individuals under house arrest around the world. Because of the sensitive nature of the business, you can’t afford any unnecessary downtime. What is the process of applying a repair to an operating system while the system stays in operations called?
a. Upgrading
b. Service pack installation
c. Hotfix
d. File update
13. What is the process of applying manual changes to a program called?
a. Hotfix
b. Service pack
c. Patching
d. Replacement
14. A newly hired junior administrator will assume your position temporarily while you attend a conference. You’re trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?
a. ACLs provide individual