You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
Correct Answer:
B
You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS).
You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?
Correct Answer:
A
What is the maximum passphrase length in Windows 2000/XP/2003?
Correct Answer:
B
A folder D:FilesMarketing has the following NTFS permissions:
. Administrators: Full Control
. Marketing: Change and Authenticated
. Users: Read
It has been shared on the server as "MARKETING", with the following share permissions:
. Full Control share permissions for the Marketing group
Which of the following effective permissions apply if a user from the Sales group accesses the \FILESERVERMARKETING shared folder?
Correct Answer:
C
Where are user accounts and passwords stored in a decentralized privilege management environment?
Correct Answer:
C