Question: 1
You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. You are concerned about the
vulnerabilities existing in the network of the company. Which of the following can be a cause for making the network vulnerable?
Each correct answer represents a complete solution. Choose two.
Question: 2
Which of the following types of servers are dedicated to provide resources to hosts on the network?
Each correct answer represents a complete solution. Choose three.
Question: 3
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to break a dat
a.txt file, 200MB in size, into two files in which the size of the first file named data.txt.aa should be 150MB and that of the second file named data.txt.ab should be 50MB. To accomplish his task and to further delete the data.txt file, he enters the following command:
split --verbose -b 150m data.txt data.txt. ; rm -vf data.txt
Which of the following commands can John use to join the splitted files into a new data.txt file?
Question: 4
Which of the following controls define the direction and behavior required for technology to function properly?
Question: 5
You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to set some terminal characteristics and environment variables. Which of the following Unix configuration files can you use to accomplish the task?