When using the 3DES encryption ( C = E K1 [D K2 [E K1 [P]]] ) , what is the function of P?
Answer : A
Attackers have the ability to use programs that are able to reveal local passwords by placing some kind of a pointer/cursor over the asterisks in a program's password field. The reason that such tools can uncover passwords in some Operating Systems is because:
Answer : A
Your network has been hit by a virus that is infecting the MBR on many of the systems in the network. You are working to repair the damage this virus has done. After two days of non-stop work on the problem, you get things under control. What type of virus was in your network?
Answer : C
You have a series of new Windows Server 2003 systems, including 3 new web servers running IIS 6.0. You are concerned about the overall security of your servers, and are checking with Microsoft for any patches or updates that you might need to apply to your systems. Which of the following would you apply if you need to implement an update to fix a specific problem that addresses a critical, non-security-related bug?
Answer : A
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like access to a file, folder, or printer, which of the following options would you use?
Answer : D
You are working on the authentication systems in your network, and are concerned with your legacy systems. In Windows NT 4.0, before Service Pack 4 (SP4), there were only two supported methods of authentication. What were those two methods?
Answer : B, C
In your organization, the majority of employees use Microsoft Outlook Express as their email client. You are configuring these systems so that applications on the employee systems cannot send email, posing as the user of the system. Under the Security tab, which option will you select to achieve this goal?
Answer : D