What is the purpose of a demilitarized zone on a network?

What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal network B. To only provide direct access to the nodes within the DMZ and protect the network behind it C. To provide a place to put the...

October 23, 2022 No Comments READ MORE +

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 113 B. 69 C. 123 D. 161View AnswerAnswer: C Explanation: https://en.wikipedia.org/wiki/Network_Time_Protocol The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP is...

October 23, 2022 No Comments READ MORE +

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?A . Overloading Port Address Translation B. Dynamic Port Address Translation C. Dynamic Network Address Translation D. Static Network Address TranslationView AnswerAnswer: D

October 23, 2022 No Comments READ MORE +

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?A . Linux B. Unix C. OS X D. WindowsView AnswerAnswer: D

October 23, 2022 No Comments READ MORE +

How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?

You have the SOA presented below in your Zone. Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries? collegae.edu.SOA, cikkye.edu...

October 23, 2022 No Comments READ MORE +

What is the first step that the bank should take before enabling the audit feature?

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?A . Perform a vulnerability scan of the system. B. Determine the impact of enabling...

October 23, 2022 No Comments READ MORE +

What is the closest approximate cost of this replacement and recovery operation per year?

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...

October 23, 2022 No Comments READ MORE +

Which Linux-based tool can change any user’s password or activate disabled Windows accounts?

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any...

October 22, 2022 No Comments READ MORE +

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Under what conditions does a secondary name server request a zone transfer from a primary name server?A . When a primary SOA is higher that a secondary SOA B. When a secondary SOA is higher that a primary SOA C. When a primary name server has had its service restarted...

October 22, 2022 No Comments READ MORE +

Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?

Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. Which of the following options...

October 22, 2022 No Comments READ MORE +