Which of the following are the major components of the IPsec protocol?
Which of the following are the major components of the IPsec protocol? Each correct answer
represents a complete solution. Choose all that apply.
Which of following is required to be configured to ensure that the Bitlocker storage can be reclaimed?
Which of following is required to be configured to ensure that the Bitlocker storage can be
reclaimed?
Which of the following are the characteristics used to make up a strong password?
The stronger password is a critical element in the security plan. Which of the following are the
characteristics used to make up a strong password?
Which of the following can be installed and configured to prevent suspicious emails from entering the userR
Which of the following can be installed and configured to prevent suspicious emails from entering
the user’s network?
Which of the following are types of password policies of Windows 7?
Which of the following are types of password policies of Windows 7? Each correct answer represents
a complete solution. Choose all that apply.
Which of the following is a technique used to attack an Ethernet wired or wireless network?
Which of the following is a technique used to attack an Ethernet wired or wireless network?
Which of the following Windows components ensure that only clients having certain health benchmarks access the
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
Which of the following technologies will you use to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows 2008 Active
Directory-based network. All client computers on the network run Windows Vista Ultimate. You
have configured a Dynamic DNS (DDNS) on the network. There are a lot of mobile users who often
connect to and disconnect from the network. Users on the network complain of slow network
responses. You suspect that the stale records on the DNS server may be the cause of the issue. You
want to remove the stale records. Which of the following technologies will you use to accomplish
the task?
Which of the following is the process used by attackers for listening to the network traffic?
Which of the following is the process used by attackers for listening to the network traffic?
Which of the following is a Windows configuration option that enables administrators to restrict communication
Which of the following is a Windows configuration option that enables administrators to restrict
communication among domain members only?