Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Study tips 1D0-470

What is a spoofing attack?

Why will it be easy for someone to steal his password?

What do the discretionary ACL (access control list) and the system ACL in Windows NT have in common?

What does the GINA DLL then do?

What are the most secure permissions you would apply to the file?

What are the security issues that arise in the use of the NFS (Network File System)?

What is the major security issue with standard NIS (Network Information System)?

Under the level C2 security classification, what does “discretionary access control” mean?

What is going to be the main obstacle preventing him from success?

Which of the following best describes the problem with share permissions and share points in Windows NT?

Posts navigation

Previous 1 … 21 22 23 Next
Equizzing
    Privacy Policy

© 2026 Equizzing