Question 41
FILL BLANK
Fill in the blank with the appropriate term.
A ______________ is a physical or logical subnetwork that contains and exposes external services of an
organization to a larger network.
Fill in the blank with the appropriate term.
A ______________ is a physical or logical subnetwork that contains and exposes external services of an
organization to a larger network.
Question 42
Adam works as a Security Analyst for Umbrella Inc. The company has a Linux-based network comprising an Apache server for Web applications. He received the following Apache Web server log, which is as follows:
[Sat Nov 16 14:32:52 2009] [error] [client 128.0.0.7] client denied by server configuration: /export/home/htdocs/test
The first piece in the log entry is the date and time of the log message. The second entry determines the severity of the error being reported.
Now Adam wants to change the severity level to control the types of errors that are sent to the error log. Which of the following directives will Adam use to accomplish the task?
[Sat Nov 16 14:32:52 2009] [error] [client 128.0.0.7] client denied by server configuration: /export/home/htdocs/test
The first piece in the log entry is the date and time of the log message. The second entry determines the severity of the error being reported.
Now Adam wants to change the severity level to control the types of errors that are sent to the error log. Which of the following directives will Adam use to accomplish the task?
Question 43
Which of the following is a type of computer security that deals with protection against spurious signals emitted
by electrical equipment in the system?
by electrical equipment in the system?
Question 44
CORRECT TEXT
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers.
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers.
Question 45
Which of the following are the responsibilities of the disaster recovery team? Each correct answer represents a
complete solution. Choose all that apply.
complete solution. Choose all that apply.

