Thursday 25 July 2013

exam dumps

QUESTION NO: 1
Which is NOT a property of a bridge?
A. Operates at Layer 2, the Data Link Layer
B. Operates at Layer 3, the Network Layer
C. Forwards the data to all other segments if the destination is not on the local segment
D. Can create a broadcast storm
Answer: B

QUESTION NO: 2
The definition A mark used in the sale or advertising of services to identify the services of one person and distinguish them from the services of others refers to a:
A. Trade name
B. Trademark
C. Service mark
D. Copyright
Answer: C

Explanation:
For answer "a trademark" is a distinctive mark of authenticity,through which the products of particular manufacturers or the vendible commodities of particular merchants may be distinguished from those of others.

QUESTION NO: 3
Which of the following statements pertaining to firewalls is incorrect?
A. Firewalls should not run NIS (Network Information Systems)
B. Firewalls should mount files systems via NFS
C. All system logs on the firewall should log to a separate host
D. Compilers should be deleted from the firewall
Answer: B

QUESTION NO: 4
Which mechanism complements an IDS?
A. Activating the built in VPN capabilities
B. Configuring built in alerts
C. All of the above
D. None of the above
Answer: B

Explanation: 
A network security engineer or other security personal must configure the IDS to detect alerts for specified security events, so the IDS will log the threat event. An IDS can either be a Network or Host based. Both have default settings and allow the administrator to configure triggers for alerts.

QUESTION NO: 5
In configuration management, a configuration item is:
A. A component whose state is to be recorded and against which changes are to be progressed.
B. The version of the operating system that is operating on the workstation that provides information security services.
C. Aseries of files that contains sensitive information.
D. The network architecture used by the organization.
Answer: A

QUESTION NO: 6
Which choices below are most accurate regarding the information needed to define the continuity strategy? Select all that apply.
A. The strategy needs to define personnel roles in implementing continuity.
B. A strategy needs to be defined to preserve computing elements, such as hardware, software, and networking elements.
C. The strategy needs to address facility use during a disruptive event.
D. None of the other alternatives apply.
Answer: A,B,C

QUESTION NO: 7
Why is security an issue when a system is booted into single-user mode?
A. The operating system is started without the security front-end loaded.
B. The users cannot log in to the system, and they will complain.
C. Backup tapes cannot be restored while in single-user mode.
D. Proper forensics cannot be executed while in single-user mode.
Answer: A

Explanation:
The correct answer is "The operating system is started without the security front-end loaded".When the operator boots the system in single-user mode, the user front-end security controls are not loaded. This mode should be used for recovery and maintenance procedures only, and all operations should be logged and audited.

QUESTION NO: 8
Astandard data manipulation and relational database definition language is:
A. OOD
B. SQL
C. Script
D. SLL
Answer: B