Question 111
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?
Question 112
You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network. You
have created a script named lf.cgi. You want to provide the following permissions on it:
rwsr-sr--Which of the following commands will you execute?
Question 113
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your
company's network. The backup policy of the company requires high security and easy recovery of data.
Which of the following options will you choose to accomplish this?
Question 114
What does the "x" character in the second field of the user account record of the /etc/passwd file indicate?
Question 115
Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?