00:00

QUESTION 76

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

Correct Answer: B

QUESTION 77

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).
You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

Correct Answer: A

QUESTION 78

What is the maximum passphrase length in Windows 2000/XP/2003?

Correct Answer: B

QUESTION 79

A folder D:FilesMarketing has the following NTFS permissions:
. Administrators: Full Control
. Marketing: Change and Authenticated
. Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
. Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \FILESERVERMARKETING shared folder?

Correct Answer: C

QUESTION 80

Where are user accounts and passwords stored in a decentralized privilege management environment?

Correct Answer: C