System Administrator 2026
What is used to protect network from outside internet access?
  • A. A trusted antivirus
  • B. 24 hours scanning for virus
  • C. Firewall to separate trusted and untrusted network
  • D. Deny users access to websites which can potentially cause security leak
What is the best practice in the firewall domain environment?
  • A. Create two domain trusted and untrusted domain
  • B. Create strong policy in firewall to support different types of users
  • C. Create a demilitarized zone
  • D. Create two dmz zones with one untrusted domain
Which direction access cannot happen using DMZ zone by default?
  • A. Company computer to dmz
  • B. Internet to dmz
  • C. Internet to company computer
  • D. Company computer to internet
What are the two features of a tripwire file system?
  • A. It is a tool to monitor file systems
  • B. It is used to automatically take corrective action
  • C. It is used to secure unix system
  • D. None of the mentioned
How do viruses avoid basic pattern match of antivirus?
  • A. They are encrypted
  • B. They act with special permissions
  • C. They modify themselves
  • D. None of the mentioned
How does an antivirus of today identify viruses?
  • A. Previously known patterns
  • B. It can detect unknown patterns
  • C. It can take high priority to increase scanning speed
  • D. None of the mentioned
What is known as a sandbox?
  • A. It is a program which can be molded to do the desired task
  • B. It is a program that is controlled or emulated section of os
  • C. It is a special mode of antivirus
  • D. None of the mentioned
What is are two safe computing practices?
  • A. Not to open software from unknown vendors
  • B. Open and execute programs in admin level/root
  • C. Open and execute programs in presence of antivirus
  • D. None of the mentioned
What are the different ways to intrude?
  • A. Buffer overflows
  • B. Unexpected combinations and unhandled input
  • C. Race conditions
  • D. All of the mentioned
What are the major components of the intrusion detection system?
  • A. Analysis engine
  • B. Event provider
  • C. Alert database
  • D. All of the mentioned