You work for a medium sized ISP and there have been several attacks of the DNS configuration recently. You are particularly concerned with DNS Spoofing and other DNS attacks. If an attacker is able to take advantage of a BIND vulnerability to gain root access, this is which type of DNS Attack?
Answer : A
Which of the following best describes the Repair Model?
Answer : E
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like access to a file, folder, or printer, which of the following options would you use?
Answer : D
You are setting the permissions on a new file in Linux. What will be the level of permission given to the user if you assign an Octal value of 7?
Answer : E
It has come to your attention that some machine has tried to send a packet to your DNS server containing both a DNS query and an answer that is false. What type of attack was used against your network?
Answer : D
As you configure your SuSe Linux computer, you make sure to modify TCP Wrappers as required by the security policy. What are two benefits that TCP Wrappers provides you with in controlling the security of the system?
Answer : A, D
Which one of the following is an incorrect mod equation?
Answer : D