skip to main
|
skip to sidebar
Pages
Home
Free HACKING Books
Password File
Google Dork
Disclaimer
Ads 468x60px
affiliate marketing
Labels
News
(57)
Home
Friday, January 24, 2014
HatHack
SecurityL1st
http://t.co/QPSwI868pC
HatHack
0 comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
Social Icons
Blog Archive
01/19 - 01/26
(12)
04/07 - 04/14
(69)
03/31 - 04/07
(30)
03/24 - 03/31
(9)
03/17 - 03/24
(50)
03/03 - 03/10
(78)
02/24 - 03/03
(119)
02/17 - 02/24
(106)
01/27 - 02/03
(23)
01/20 - 01/27
(66)
01/13 - 01/20
(32)
HatHack. Powered by
Blogger
.
Live
Feedjit Live Blog Stats
Popular Posts
Older MiniDuke strain found, raises questions about its origins
Camfrog Video Chat 6.4.257
Must-know Information about Microsoft Windows
Qualys and Verizon join forces for new IT security and compliance solutions
HatHack
What is Windows 7?
After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams.... * Reinforces what you learnt - fill in the gaps of what you missed * Gets you used to answering questions to build confidence and familiarity Here are 10 Multiple choice exams questions for you to practice on: ______________________________ Question 1# - You are the network administrator for ABC.com. You have recently transferred 200 employees from one office to another. You need to move the user accounts for these users from one Organizational Unit to another in the most efficient manner within your Windows Server 2003 Active Directory network. In order to perform this task from the command line, what is the correct command that you will need to use? A. dsmod B. dsmove C. dsget D. dsput _____________________ Question 2# - You are the network administrator for ABC.com. The network consists of a single Active Directory domain abc.com. All network servers run Windows Server 2003. Your network includes a shared folder named projectDocs. This folder must not be visible in a browse list. However, users report that they can see projectDocs when they browse for shared folders. How should you solve this problem? A. Modify the share permissions to remove the All - Read permission on projectDocs from the Users group. B. Modify the NTFS permissions to remove the Allow - Read permissions on projectDocs from the Users group. C. Change the share name to Sales Resources#. D. Change the share name to Sales Resources$. _____________________ Question 3# - You are the systems administrator for a small company that has only 1 printer. The HR department only uses the printer on Monday to print paychecks that are due on Tuesday, however, while the checks are printing the printer is tied up and nobody else can print. Which of the following is the easiest and most efficient solution to this problem? A. Create another printer and assign a priority of 99 to it and instruct the HR department to send the paychecks to this newly created printer B. Configure each of the drivers to print directly to the printer C. Add another printer in the Add Printer Wizard that points to the same print device. Make this printer available between the hours of 5pm and 5am. Instruct the HR Department to use this printer for printing checks _____________________ Question 4# - Out of the following, identify a feature of basic disk. A. Enables you to set aside space to arrange data B. Allows you to configure unlimited number of volumes per disk C. Enables you to combine noncontiguous unallocated space into one partition D. Enables you to create fault-tolerant disks _____________________ Question 5# - You want to perform multiple backups of only those files that are modified since the last normal backup. You also want to ensure that the backed up files use minimum amount of media. In this case, you will take a: A. Normal backup B. Differential backup C. Incremental backup D. Copy backup _____________________ Question 6# - Special permissions can be reached by using the Advanced Tab on the Permissions Property sheets. What does the special permission ?Delete Subfolders and Files? include? Choose all that apply A. Full Control B. Modify C. Read and Execute D. List Folder Contents E. Read F. Write _____________________ Question 7# - The System Monitor interface provides the ability to monitor system performance using which of the following methods? Choose all that apply A. Graphs B. Logs C. Alerts _____________________ Question 8# - A volume spans multiple disks on a Windows Server 2003 computer named Server1. A hardware failure has occurred and you need to allow access to the volume while Server1 is being repaired. In this situation, it is most appropriate to: A. use the Disk Management utility to recover the volume on Server1 B. move all the dynamic disks containing parts of the volume to another Windows Server 2003 computer and import the disks in the disk group on the target computer C. import some of the dynamic disks of the volume into another disk group on Server1. D. move some of the disks containing parts of the volume to another computer and delete the volume on Server1 _____________________ Question 9# - you assign a user a quota of 50mb on the company server. Th user attemps to copy a compressed folder containing 40mb of compressed data to the partition on the server. The operation will not complete and the user receives an error message that he has run out of disk space. How do you correct this problem while maintaining a limit for the user? A. Disk quotas and compression are incompatible. The user must uncompress his files before copying them to the server B. Disable the Deny Disk Space to users exceeding quota limit option C. Find out the size of his data when it is uncompressed and increase his quota to that amount _____________________ Question 10# - the Disk Management MMC snap-in interface allows? A. Disk initialization B. Formatting of volumes (NTFS and FAT) C. The creation of fault-tolerant disk systems D. All the above _____________________ ANSWERS MCSA Question 1# - Correct Answers: A MCSA Question 2# - Correct Answers: D MCSA Question 3# - Correct Answers: C MCSA Question 4# - Correct Answers: A MCSA Question 5# - Correct Answers: C MCSA Question 6# - Correct Answers: A MCSA Question 7# - Correct Answers: A,B,C MCSA Question 8# - Correct Answers: B MCSA Question 9# - Correct Answers: C MCSA Question 10# - Correct Answers: D
Test malware handling capabilities of network security devices
3 out of 4 infosec pros unsure they would spot a breach
What is LDAP server? Directory service (LDAP server) is a software system that stores, organizes and provides access to information in a directory; a shared information infrastructure for locating, managing, administering, and organizing common items and network resources, which can include volumes, folders, files, printers, users, groups, devices, telephone numbers and other objects. To access directories servers and clients interact in the model of client/server communication. The process of directory access happens in the following way: a directory client calls API (application programming interface) to access a directory for reading or writing the information. The client call accesses the information in the directory on behalf of the requesting client via TCP/IP (the default LDAP TCP/IP ports ? 636 for secure communications, 389 for unencrypted communications). The results of the action are returned to the client then. Servers provide a specific service to LDAP clients. Sometimes directory servers may become the clients of other servers to collect the necessary information for request processing. LDAP server performs the following basic operations: Search entries; Compare entries; Add entries; Delete entries; Modify entries; Move entries; Rename entries; Extended operation; Authentication. According to X.500 standard, servers can be connected into a hierarchical structure. That is why users can proceed from one server to another while searching the necessary information. Web interface is widely used for server administration including remote administration. Directory services can be used for: Locating and providing information about people (address books, yellow pages, white pages) and distributed resources like printers; User authentication and authorization for Web servers or other LDAP-enabled applications; Policies that are shared by multiple applications or application instances. Directory server main components are: A front-end (handles LDAP client operations coming into the server over TCP/IP connection); A database back-end (handles stores and retrieves directory objects from relational database). Some researchers and professionals highlight the best LDAP servers from the number of open source and commercial ones: Open source LDAP servers include: Red Hat Directory Server/Fedora Directory Server. Red Hat Directory Server was initially bought from Netscape Security Solutions as a commercial product for Red Hat Enterprise Linux. Nowadays it is produced by Red Hat with name Red Hat Directory Server. Following its policy Red Hat produced version for Fedora Core also. It is called Fedora Directory Server that is perfect for distributives on the basis of RedHat. Codes of these servers coincide greatly because of the common root. Unlike OpenLDAP Fedora/Red Hat directory servers have good documentation. OpenLDAP. OpenLDAP is the further development of the original slapd. It is widely distributed and used on many platforms like Linux, FreeBSD, Windows and MacOS X. Documentation containing on the website is quite obsolete, but there are many useful step-by-step instructions. OpenLDAP is time-tested. Its functionality is practically identical to RedHat directory server. Commercial LDAP Servers are: Novell eDirectory. All products are free for higher educational establishments. It works with the help of the following operational systems: Novell Netware, Windows (NT), Linux (SUSE Enterprise, or RedHat), Solaris, AIX, HP-UX. You have everything in one product ? all the necessary programs are given at once. Installation and customization are easy. Advantages - exclusive documentation and affordable price, technical support for registered users and cross-platform function. Disadvantage ? closed source files. Microsoft Active Directory. It is a part of Windows Server family. It?s a perfect solution for MS networks. Advantages ? perfect integration into the system, highly qualified documentation. Sun Java System Directory Server. Sun merged with IPlanet Company and created its new product ? Sun ONE, renamed afterwards to Sun Java System Directory Server. It is not a standalone product, but just a part of Java Enterprise System. System requirements: Solaris 10, Solaris 9, Solaris 8 (only for SPARC), Red Hat Enterprise Linux 2.1 and 3.1, HP-UX 11i, Microsoft Windows 2000, XP, 2003. You can not buy it apart from Java Enterprise System. But if you decide to use complex solution from Sun, you won?t have any problems. Sun engineers will help you to install and configure it according to your requirements. IBM Tivoli Directory Server. LDAP-solution from IBM. It is supported by the following operational systems: AIX, Solaris, Microsoft Windows 2000, HP-UX, and also Linux for Intel and IBM eServer iSeries, pSeries and zSeries. Advantage ? qualified, open and free for all documentation. LDAP servers cannot access directories without LDAP clients. Some of them are presented below: Microsoft Windows: Softerra LDAP Administrator/LDAP Browser; LDAPSoft LDAP Browser/LDAP Admin Tool; LDAPAdmin; MaXware Directory Explorer; Active Directory Explorer Linux/UNIX Evolution; KAddressBook; LDAPSoft LDAP Browser/Administrator. Mac OS X Address Book; Directory Access; Workgroup Manager. Cross-platform: Apache Directory Studio; Ekiga (formerly GnomeMeeting); Mozilla Thunderbird; Novell Evolution; phpLDAPadmin. Storing data in a directory and sharing it amongst applications saves you time and money by keeping administration effort and system resources down.
TWITTER
Tweets by @HatHack
Count
Get the
Free Hit Counter for Your Website or Blog
widget and many other
great free widgets
at
Widgetbox
! Not seeing a widget? (
More info
)
About Me
Admin
HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!
View my complete profile
Visits
Sample Text
affiliate marketing
0 comments:
Post a Comment