GSEC Exam Question 116

Which of the following are the types of routing protocols?
Each correct answer represents a complete solution. Choose two.
  • GSEC Exam Question 117

    Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.
  • GSEC Exam Question 118

    After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
  • GSEC Exam Question 119

    Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration? Each correct answer represents a part of the solution. Choose two.
  • GSEC Exam Question 120

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?
    Each correct answer represents a complete solution. Choose all that apply.