You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like the computer restarting, which of the following options would you use?
You are running a computer that boots to multiple operating systems on multiple partitions and wish to use Windows 2003 data encryption to protect your files. Which of the following options will Windows 2003's EFS perform?
You are reviewing the lines used in the configuration of TCP Wrappers on your Linux system. When placed in the denial file, what is the function of the following line? in.telnetd: 192.168.23.: spawn (/bin/echo %c >> /var/log/telnet.log)
You suspect that your root account has been compromised. What command can you run on your Linux system, in the /var/log directory to see you the recent login activity of the root account?
You are going to use EFS to increase the security of the files and folders on your Windows Server 2003 systems in your network. You wish to have complete knowledge of the process of EFS, so that you may manage any situations or problems that may arise. What is file data encrypted with when using EFS?