You wish to increase the security of your Windows 2000 system by modifying TCP/IP in the Registry. To alter how Windows reacts to SYN Attacks, which three values are adjusted?
Answer : A, B, D
In Windows NT 4.0, before Service Pack 4 (SP4), there were only two supported methods of authentication. What were those two methods?
Answer : B, C
What of the following user accounts are given the correct default User Identifier and Group Identifier, assuming the system is running Red Hat Linux?
Answer : B, C, D
You suspect that your root account has been compromised. What command can you run on your Linux system, in the /var/log directory to see you the recent login activity of the root account?
Answer : D
You are logged in to your Linux system as root. You are testing the command telinit. If you enter the telinit 6 command, what will happen?
Answer : D
While configuring TCP Wrappers on your Linux system, you desire to create a line that will effect every local computer's access to the ftp service. Which of the following lines will achieve this desired result?
Answer : B
You are viewing the /etc/passwd file on your Red Hat Linux computer, and you see the following entry:
root:23rs5:0:0:root:/root:/bin/bash In this entry, what does the 23rs5 mean?
Answer : E