What should you do?
You need to design a method to encrypt confidential data. The design solution must address the concerns of the chief information officer.
What should you do?
What should you do?
You need to design a remote administration solution for servers on the internal network. The solution you design must meet the business and security requirements of International Pisces Breeders.
What should you do?
What should you do?
You need to design an access control strategy that meets business and security requirements of International Pisces Breeders whilst ensuring the design solution minimizes forestwide replication.
What should you do?
What should you do?
You need to design a method implement a patch management system. In your solution take care to meet technical requirements.
What should you do?
What should you do?
You need to design an authentication solution for wireless network access for the administrators in their regions. Your solution must meet business and technical requirements. What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design a PKI solution. In your solution take care to meet business and security requirements.
What should you do?
What should you do?
You need to design a security strategy that will ensure that no unauthorized users are able to access personnel data.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design an access control solution for customer information that is transmitted over the Internet. In your solution take care to meet security requirements. What should you do? (Each correct answer presents part of the solution. Choose THREE.)
What should you do?
You need to design an authentication strategy for the administrators of the IT department to remotely connect to the network. In your solution take care to meet security requirements.
What should you do?
What should you do?
You need to redesign the Grand National Active Directory structure to support the new client/server application. This means accommodating an access control strategy for resources that are located in the extranet for partners and for internal users. In your solution take care to meet business and security requirements.
What should you do?