00:00

QUESTION 1

Which of the following monitors program activities and modifies malicious activities on a system?

Correct Answer: C

QUESTION 2

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching-only DNS server are correct?
Each correct answer represents a complete solution. Choose three.

Correct Answer: BCD

QUESTION 3

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

Correct Answer: A

QUESTION 4

Which of the following techniques is used to identify attacks originating from a botnet?

Correct Answer: C

QUESTION 5

You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP-based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?

Correct Answer: B