Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is FAT. You wish to encrypt a folder created on the system partition for the purpose of data security. Which of the following statements is true about this situation?
What are the purposes of audit records on an information system?
Each correct answer represents a complete solution. Choose two.
Which of the following statements is NOT true about FAT16 file system?
Each correct answer represents a complete solution. Choose all that apply.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Which of the following types of evidence is considered as the best evidence?
Which of the following registry hives contains information about all users who have logged on to the system?
You want to change the attribute of a file named ACE.TXT to Hidden. Which command line will enable you to set the attribute?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are creating a user account by using the USERADD command. Which of the following entries cannot be used for specifying a user ID?
Each correct answer represents a complete solution. Choose all that apply.
In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?