/etc/security/user
/etc/services
/etc/inetd.conf
/etc/hosts.equiv
第1题:
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()
第2题:
Which of the following should be configured on a wireless router to enhance security? (Select TWO).()
第3题:
A. Remote Desktop Users
B. Power Users
C. Administrators
D. Backup Operators
第4题:
Which of the following groups should a user be added to for the ability to restore files, withoutgranting any ownership privileges?()
第5题:
A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).
第6题:
On a Windows XP machine, which of the following settings should be configured to allow draggingof files without holding the mouse button?()
第7题:
A technician is renaming files on a PC from a command prompt and is currently in the root of driveC: Which of the following commands should the technician use to move to a different directory? ()
第8题:
A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server. Which of the following commands is required to complete the activation?()
第9题:
Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()
第10题:
When installing a wireless access point, which of the following should the technician perform FIRST?()