Which of the following monitors program activities and modifies malicious activities on a system?
Correct Answer:
C
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching-only DNS server are correct?
Each correct answer represents a complete solution. Choose three.
Correct Answer:
BCD
Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?
Correct Answer:
A
Which of the following techniques is used to identify attacks originating from a botnet?
Correct Answer:
C
You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP-based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?
Correct Answer:
B