Free II0-001 Exam Braindumps (page: 15)

Page 14 of 58

The following log is an example of:

  1. A telnet session into a Linux system and a view of the /log/messages file.
  2. An Intrusion Detection log file.
  3. A firewall log file
  4. The MS XP graphical version of NETSTAT showing all active connections

Answer(s): C



Some disk imaging techniques miss "hidden" or divergent operating system partitions. A method of ensuring that no partitions are missed during imaging is by:

  1. Using a partition replicating stream copy method
  2. Copy each partition under the operation system that it is native to
  3. Utilizing fdisk /p /recovery
  4. Utilizing dd

Answer(s): D



An inode table is to Linux as:

  1. NTFS is to NT
  2. DET is to NDS
  3. modile is to Servix
  4. None of the above

Answer(s): B



When auditing log files for system discrepancies, why is NTP important?

  1. To ensure that news protocols are not dumping into the log files
  2. To ensure time synchronization on logs
  3. To prevent future attacks of the same signature
  4. It does not matter.

Answer(s): B






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts