Which of the following is a disadvantage of using biometric identification?
Which of the following is a disadvantage of using biometric identification?
Which of the following is a feature that you will use to reassign permissions without assigning permissions to
You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following is a feature that you will use to reassign permissions without assigning
permissions to every parent and child folder?
Which of the following is a US Federal government algorithm created to generate a secure message digest?
Which of the following is a US Federal government algorithm created to generate a secure message
digest?
Which of the following can be implemented to ensure that the computers are using latest security updates?
Which of the following can be implemented to ensure that the computers are using latest security
updates?
Which of the following are the types of group scopes?
Which of the following are the types of group scopes? Each correct answer represents a complete
solution. Choose all that apply.
What will Mark do to accomplish the task?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. Mark configures Network Access Protection (NAP) on the network. He then
configures secure wireless access to the network from all access points on the network. He also
configures 802.1x authentication for accessing the network. Mark wants to ensure that all
computers connecting to the network are checked by NAP for the required configuration and update
status. What will Mark do to accomplish the task?
Which of the following technologies will you use to accomplish the task?
You work as a security manager for Company Inc. An individual is connecting to your corporate
internal network over the Internet. You have to ensure that he is not an intruder masquerading as an
authorized user. Which of the following technologies will you use to accomplish the task?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
How will you configure for dynamic updates?
All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP
address from the DHCP server. You had also configured the Active Directory on the domain
controllers. You want to configure your DNS settings so that it will dynamically update DNS data
whenever the IP address of a domain controller changes. How will you configure for dynamic
updates?
Which of the following are the features of security level in the Restricted Sites zone
Which of the following are the features of security level in the Restricted Sites zone