You are creating the User Account section of your organizational security policy. From the following options, select the questions to use for the formation of this section?
Answer : B, C, D
You are in the process of securing several new machine on your Windows 2003 network. To help with the process Microsoft has defined a set of Security Templates to use in various situations. Which of the following best describes the Secure Security Templates (SECURE*.INF)?
Answer : C
Which of the following has the stages of Risk Analysis in order, from a to e?
a. Management
b. Threat Assessment
c. Control Evaluation
d. Inventory
e. Monitoring
Answer : C
You have a file on your Linux system, and you need to modify the file's permissions. The permissions you wish to apply are: Read, Write, and Execute for the User; Read for the Group: and Read for the Others. What command will allow you to achieve this?
Answer : A
What can be used to remove any of the frequency and statistical relationship between unencrypted and encrypted text? (Choose two)
Answer : D, E
You suspect that your root account has been compromised. What command can you run on your Linux system, in the /var/log directory to see you the recent login activity of the root account?
Answer : D
You are working on the authentication systems in your network, and are concerned with your legacy systems. In Windows NT 4.0, before Service Pack 4 (SP4), there were only two supported methods of authentication. What were those two methods?
Answer : B, C