- (Topic 2) Which of the following are attributes of the
tag? (Choose three)
Correct Answer:ABD The WIDTH attribute of the <TABLE> tag is used to set the width of a table. Width can be specified in pixels and percentage. For example, if a table of the same width as that of the parent object has to be created, the WIDTH attribute must be set to 100%. The ALIGN attribute aligns the table within the text flow. By default alignment is set to left. The BORDER attribute of the <TABLE> tag is used to set the width of the table border. Answer C is incorrect. <TD> is not an attribute of the <TABLE> tag. It is a tag used to specify cells in a table.
QUESTION 52
- (Topic 2) Which of the following firewalls inspects the actual contents of packets?
Correct Answer:D
The application level firewall inspects the contents of packets, rather than the source/destination or connection between the two. An Application level firewall operates at the application layer of the OSI model. Answer A is incorrect. The circuit-level firewall regulates traffic based on whether or not a trusted connection has been established. It operates at the session layer of the OSI model. Answer C is incorrect. The packet filtering firewall filters traffic based on the headers. It operates at the network layer of the OSI model. Answer B is incorrect. The stateful inspection firewall assures the connection between the two parties is valid and inspects packets from this connection to assure the packets are not malicious.
QUESTION 53
- (Topic 4) You are concerned about war driving bringing hackers attention to your wireless network. What is the most basic step you can take to mitigate this risk?
Correct Answer:C By not broadcasting your SSID some simple war driving tools won't detect your network. However you should be aware that there are tools that will still detect networks that are not broadcasting their SSID across your network. Answer D is incorrect. While MAC filtering may help prevent a hacker from accessing your network, it won't keep him or her from finding your network.
QUESTION 54
- (Topic 4) Which of the following tools can be used by a user to hide his identity?
Correct Answer:BCE
A user can hide his identity using any firewall (such as IPChains), a proxy server, or an anonymizer.
QUESTION 55
- (Topic 3) You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to identify the list of users with special privileges along with the commands that they can execute. Which of the following Unix configuration files can you use to accomplish the task?
Correct Answer:D In Unix, the /etc/sudoers file contains a list of users with special privileges along with the commands that they can execute. Answer A is incorrect. In Unix, the /proc/meminfo file shows information about the memory usage, both physical and swap. Answer B is incorrect. In Unix, the /etc/sysconfig/amd file is the configuration file that is used to configure the auto mount daemon. Answer C is incorrect. In Unix, the /proc/modules file shows the kernel modules that are currently loaded.