00:00

QUESTION 71

Why would someone use port 80 for deployment of unauthorized services?

Correct Answer: D

QUESTION 72

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AD

QUESTION 73

Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

Correct Answer: CD

QUESTION 74

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He is currently working on his C based new traceroute program. Since, many processes are running together on the system, he wants to give the highest priority to the cc command process so that he can test his program, remove bugs, and submit it to the office in time. Which of the following commands will John use to give the highest priority to the cc command process?

Correct Answer: C

QUESTION 75

There are three key factors in selecting a biometric mechanism. What are they?

Correct Answer: C