ML0-220 Free Dumps Study Materials
Question 10: The most common method of social engineering is:
A. Looking through users' trash for information
B. Calling users and asking for information
C. E-mailing users and asking for information
D. E-mail
Correct Answer: B
15.The full form of IDS is ____________
A. Intrusion Detection System
B. Intrusion Deactivation System
C. Information Distribution System
D. Intrusion Detection Software
Correct Answer: A
17.What is an Intranet?
A. A private network using World Wide Web technology
B. A private network using digital telephony services
C. A public network using World Wide Web technology
D. A public network using digital telephony services
Correct Answer: A
18.Which of the following is the best description of" separation of duties"?
A. Assigning different parts of tasks to different employees
B. Employees are canted only the privileges necessary to perform their tasks
C. Each employee is granted specific information that is required to carry out the job
function
D. Screening employees before assigning them to a position
Correct Answer: A
19.Who is the main person responsible for installation and maintenance of the
computer systems?
A. Chief Executive Officer
B. System Supplier
C. System Designer
D. Business Process Owner
Correct Answer: B
20.You have a network address of 196.202.56.0 with four subnets. You wont to allow
for maximum number of Hosts. What is the
subnet mask you need to apply?
A. 255.255.255.224
B. 255.255.224.0
C. 255.255.255.128
D. 255.255.255.192
Correct Answer: A