Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 1D0-470

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 1D0-470

Quiz 1D0-470 , CIW Security Analyst.

Which choice lists the ports used by Microsoft internal networking that should be blocked from outside access?

What is included in the formula that Windows NT/2000 uses to create the security identifier?

Which shell command can he use to see only that information?

Which service, tool or command allows a remote or local user to learn the directories or files that are accessible on the network?

Which type of attack occurs when a hacker obtains passwords and other information from legitimate transactions?

Which service, command or tool allows a remote user to interface with a system as if he were sitting at the terminal?

What common target can be reconfigured to disable interfaces and provide inaccurate IP addresses over the Internet?

Which of the following is a way to get around a firewall to intrude into a secure network from a remote location?

Which of the following must Helga’s rule contain?

Which of the following is the most desirable goal that UNIX system crackers typically hope to achieve?

Posts navigation

Previous 1 2 3 … 23 Next
Equizzing
    Privacy Policy

© 2025 Equizzing