GSEC Exam Question 116
Which of the following are the types of routing protocols?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GSEC Exam Question 117
Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.
GSEC Exam Question 118
After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
GSEC Exam Question 119
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration? Each correct answer represents a part of the solution. Choose two.
GSEC Exam Question 120
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the modified date and time of the file private.txt to 11 Nov 2009 02:59:58 am. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.