You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory - based single forest
single domain network. You have installed a Windows Server 2008 computer. You have configured
auditing on this server. The client computers of the company use the Windows XP Professional
operating system. You want to audit each event that is related to a user managing an account in the
user database on the computer where the auditing is configured. To accomplish the task, you have
enabled the Audit account management option on the server.
Which of the following events can be audited by enabling this audit option?
Each correct answer represents a complete solution. Choose all that apply.
Question No 2
John works as a contract Ethical Hacker. He has recently got a project to do security checking for
www.we - are - secure.com. He wants to find out the operating system of the we - are - secure server in
the information gathering step. Which of the following commands will he use to accomplish the
task?
Each correct answer represents a complete solution. Choose two.
Question No 3
You check performance logs and note that there has been a recent dramatic increase in the amount
of broadcast traffic. What is this most likely to be an indicator of?
Question No 4
You run the wc - c file1.txt command. If this command displays any error message, you want to store
the error message in the error.txt file. Which of the following commands will you use to accomplish
the task?
Question No 5
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux - based
network. John is working as a root user on the Linux operating system. He wants to forward all the
kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes
will he perform in the syslog.conf file to accomplish the task?