Exam 5: File, Directory, and Shared Resource Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
As an administrator, you can easily verify how groups are set up by periodically reviewing the contents of the ____________________ file.
(Short Answer)
4.8/5
(49)
Which attributes do NTFS and FAT/FAT16 file systems have in common?
(Multiple Choice)
4.8/5
(34)
Which Netware 6.x directory attribute flags the directory to show it contains operating system files?
(Multiple Choice)
5.0/5
(25)
Security groups are used for e-mail or telephone lists, to provide quick, mass distribution of information, and they cannot be used to assign any permissions.
(True/False)
4.8/5
(41)
If you want to compress files, which attribute cannot be set on the files?
(Multiple Choice)
4.8/5
(33)
Which Red Hat Linux system directory is a virtual file system allocated in memory only, and contain files that refer to various processes running on the system, as well as details about the operating system kernel?
(Multiple Choice)
4.9/5
(34)
In Linux/UNIX, when a directory is flagged with a(n) _____, that means a user or a group can access and list its contents.
(Multiple Choice)
4.9/5
(40)
Which of the following are components of an access control list?
(Multiple Choice)
4.9/5
(26)
Does the Red Hat Linux /lib directory contain configuration files that the system uses when the computer starts?
(True/False)
4.9/5
(33)
To ensure proper security, use ____________________ authentication on Linux/UNIX systems.
(Short Answer)
4.9/5
(41)
Match the following terms to the appropriate definitions.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(39)
Which Red Hat Linux system directory contains configuration files that the system uses when the computer starts, most of which are reserved for the system administrator, because they contain system-critical information?
(Multiple Choice)
4.9/5
(39)
Folders can be marked as ____________________ to prevent users from viewing their contents.
(Short Answer)
4.8/5
(34)
What are the three Windows 2000/XP/2003 share permissions for folders?
(Essay)
4.8/5
(38)
Can a security descriptor for a server control which accounts have access to the server, or whether that server can even be accessed over the network?
(True/False)
4.9/5
(34)
To map the PUBLIC directory as search drive S1 in Netware 6.x, you would type ____________________.
(Short Answer)
4.8/5
(33)
Showing 61 - 80 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)