Question 141
Which of the following is included in a memory dump file?
Question 142
Which of the following methods can be used to start the Disk Defragmenter utility in Windows 9x?
Each correct answer represents a complete solution. Choose two.
Question 143
By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.
Question 144
You are the Network Administrator and your company has recently implemented encryption for all emails.
You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?
Question 145
On which of the following locations does the Windows NT/2000 operating system contain the SAM, SAM.LOG, SECURITY.LOG, APPLICATION.LOG, and EVENT.LOG files?