GCFA Exam Question 86

Which of the following tools is used to block email, Instant Message, Web site, or other media if inappropriate words such as pornography, violence etc. is used?
  • GCFA Exam Question 87

    You work as a Network Administrator for uCertify Inc. You want to edit the MSDOS.SYS file, in your computer, from the DOS prompt. You are unable to find the file. What is the most likely cause?
  • GCFA Exam Question 88

    Adam works as a Security Administrator for Umbrella Inc. He is responsible for securing all 15 servers of the company. To successfully accomplish the task, he enables the hardware and software firewalls and disables all unnecessary services on all the servers. Sales manager of the company asks Adam to run emulation software on one of the servers that requires the telnet service to function properly. Adam is concerned about the security of the server, as telnet can be a very large security risk in an organization. Adam decides to perform some footprinting, scanning, and penetration testing on the server to checkon the server to check the security. Adam telnets into the server and writes the following command:
    HEAD / HTTP/1.0
    After pressing enter twice, Adam gets the following results: Which of the following tasks has Adam just accomplished?
  • GCFA Exam Question 89

    Your network has a Windows 2000 Server computer with FAT file system, shared by several users.
    This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access.
    You want to accomplish the following goals:
    Data should be secure and encrypted.

    Administrative efforts should be minimum.

    You should have the ability to recover encrypted files in case the file owner leaves the company.

    Other permissions on encrypted files should be unaffected.

    File-level security is required on the disk where data is stored.

    Encrypting or decrypting of files should not be the responsibility of the file owner.

    You take the following steps to accomplish these goals :
    Convert the FAT file system to Windows 2000 NTFS file system.

    Use Encrypting File System (EFS) to encrypt data.

    Which of the following goals will you be able to accomplish?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCFA Exam Question 90

    Which of the following directories cannot be placed out of the root filesystem?
    Each correct answer represents a complete solution. Choose all that apply.