Answer:
d. The technician should be setting NTFS permissions instead of using Group Policy.
Explanation:
NTFS (New Technology File System) permissions run on drives formatted with NTFS.Under NTFS permissions, individual users are granted permission at the Windows logon and so in this way local users and network users are affected, affecting each user from wherever he may be connecting from. In the example above using NTFS permissions would solve the problem of file system among departments .
Answer: Stealth scanning technique
Explanation:
Stealth scanning technique consist of the following types of scans :
1. FIN scan
2. X- MAS tree scan
3. NULL scan
The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.
The X-MAS tree scan fires up by setting a TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.
NULL scans sends null packet and considers it to be an open port.
Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.
Answer:
Personal software process is basically refers to the intellectually tough and demanding for a degree of commitment (for example: Prolonged and high priced training needed ) which are not usually feasible to attain.
In additional to the requiring stage of various dimension is culturally tough for various software program practitioners. As, it is not much feasible approach so the personal software processing is not much widely adopted by the various software industries.