MultipleChoice
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
OptionsMultipleChoice
Which of the following directories contains the log files in Linux?
OptionsMultipleChoice
Which of the following is a security threat if included in the search path of a computer?
OptionsMultipleChoice
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He executes the following command in the terminal:
echo $USER, $UID
Which of the following will be displayed as the correct output of the above command?
OptionsMultipleChoice
Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?
OptionsMultipleChoice
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BaseT network interface cards in servers and client computers. What is the maximum segment length that a 1000BaseT network supports?
OptionsMultipleChoice
The /cat/etc/passwd file on a client computer contains the following entry:
Martha:x:::::bin/false
Which of the following is true for Martha?
OptionsMultipleChoice
Which of the following is not an encryption technology?
OptionsMultipleChoice
Which of the following statements regarding Secure Sockets Layer (SSL) are true?
Each correct answer represents a complete solution. Choose all that apply.
OptionsMultipleChoice
Which of the following terms refers to manual assignment of IP addresses to computers and devices?
Options