Which of the following refers to a security access control methodology whereby the 48-bit address is assigned
Which of the following refers to a security access control methodology whereby the 48-bit address is assigned to each network card which is used to determine access to the network?
Which of the following security zones is used for Web sites that the user does not trust?
Which of the following security zones is used for Web sites that the user does not trust?
Which of the following works at the network layer and hides the local area network IP address and topology?
Which of the following works at the network layer and hides the local area network IP address and topology?
What should he do to prevent this? Each correct answer represents a complete solution
A user has opened a Web site that automatically starts downloading malicious code onto his computer.
What should he do to prevent this? Each correct answer represents a complete solution. Choose two.
Which of the following authentication methods will you choose for Exchange ActiveSync?
You work as an Exchange Administrator for TechWorldInc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. You are in the process of choosing an authentication method for Exchange ActiveSync. You need an authentication method that requires both, a password and an external device.
Which of the following authentication methods will you choose for Exchange ActiveSync?
Which of the following can search contents of a hard disk, address book of an e-mail, or any information about
Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge?
Assuming this situation, which of the following attacks is the company being subjected to?
You work as a Network Administrator for SpyNet Inc.The company has a Windows-based network.
You have been assigned the task of auditing the scheduled network security. After a regular audition, you suspect that the company is under attack by an intruder trying to gain access to the company’s network resources. While analyzing the log files, you find that the IP address of the intruder belongs to a trusted partner company.
Assuming this situation, which of the following attacks is the company being subjected to?
Which of the following steps will help in system orhost hardening? Each correct answer represents a complete s
Which of the following steps will help in system orhost hardening? Each correct answer represents a complete solution. Choose two.